CVE-2026-2020
Received Received - Intake
PHP Object Injection in JS Archive List WordPress Plugin

Publication date: 2026-03-07

Last updated on: 2026-03-07

Assigner: Wordfence

Description
The JS Archive List plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 6.1.7 via the 'included' shortcode attribute. This is due to the deserialization of untrusted input supplied via the 'included' parameter of the plugin's shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-07
Last Modified
2026-03-07
Generated
2026-05-07
AI Q&A
2026-03-07
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
wordfence jquery-archive-list-widget to 6.1.7 (inc)
wordfence jquery-archive-list-widget 6.2.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-502 The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The JS Archive List plugin for WordPress is vulnerable to PHP Object Injection in all versions up to and including 6.1.7 via the 'included' shortcode attribute.

This vulnerability arises because the plugin deserializes untrusted input supplied through the 'included' parameter of its shortcode, allowing an attacker with Contributor-level access or higher to inject a PHP object.

Although no known POP (Property Oriented Programming) chain exists in the plugin itself, if a POP chain is available through other installed plugins or themes, the attacker could exploit this to delete arbitrary files, retrieve sensitive data, or execute arbitrary code.


How can this vulnerability impact me? :

If exploited, this vulnerability can allow an authenticated attacker with at least Contributor-level access to inject malicious PHP objects.

In the presence of a suitable POP chain from other plugins or themes, the attacker could perform dangerous actions such as deleting arbitrary files, accessing sensitive information, or executing arbitrary code on the server.

This can lead to significant security breaches including data loss, data theft, and full system compromise.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

The vulnerability involves PHP Object Injection via the 'included' shortcode attribute in the JS Archive List WordPress plugin up to version 6.1.7. Detection would focus on identifying usage of this shortcode with suspicious or unexpected serialized data in the 'included' parameter.

Since the vulnerability requires authenticated users with Contributor-level access or higher to exploit, monitoring WordPress shortcode usage and user activity logs for unusual 'included' parameter values is recommended.

There are no explicit detection commands or network signatures provided in the available resources.

However, to detect potential exploitation attempts, you could search your WordPress database or logs for shortcode usage patterns like:

  • Search for posts or content containing the shortcode with the 'included' attribute, e.g., using SQL: SELECT * FROM wp_posts WHERE post_content LIKE '%[included=%';
  • Check web server access logs for POST or GET requests containing the shortcode or suspicious serialized PHP objects in parameters.
  • Monitor authenticated user actions, especially those with Contributor or higher roles, for unusual shortcode submissions or content edits involving the 'included' parameter.

No specific commands or automated detection tools are mentioned in the provided resources.


What immediate steps should I take to mitigate this vulnerability?

[{'type': 'paragraph', 'content': 'To mitigate the PHP Object Injection vulnerability in the JS Archive List plugin (up to version 6.1.7), immediate steps include:'}, {'type': 'list_item', 'content': 'Update the jquery-archive-list-widget plugin to a version later than 6.1.7 where the vulnerability is fixed (e.g., version 6.2.0 or later).'}, {'type': 'list_item', 'content': 'Restrict Contributor-level and higher user permissions to trusted users only, as exploitation requires authenticated access.'}, {'type': 'list_item', 'content': 'Disable or remove the vulnerable shortcode usage if updating is not immediately possible.'}, {'type': 'list_item', 'content': "Review and sanitize any input passed to the 'included' shortcode attribute to prevent deserialization of untrusted data."}, {'type': 'paragraph', 'content': 'The plugin update (noted in version 6.2.0) includes security improvements and tests to mitigate such vulnerabilities.'}] [6]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart