CVE-2026-3017
Received Received - Intake
PHP Object Injection in Smart Post Show Plugin via Deserialization

Publication date: 2026-04-14

Last updated on: 2026-04-14

Assigner: Wordfence

Description
The Smart Post Show – Post Grid, Post Carousel & Slider, and List Category Posts plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.0.12 via deserialization of untrusted input in the import_shortcodes() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-14
Last Modified
2026-04-14
Generated
2026-05-07
AI Q&A
2026-04-14
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
smart_post_show post_grid_post_carousel_slider to 3.0.12 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-502 The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

If exploited, this vulnerability can lead to severe impacts including:

  • Deletion of arbitrary files on the server.
  • Retrieval of sensitive data from the system.
  • Execution of arbitrary code, potentially allowing full control over the affected system.

These impacts depend on the presence of a POP chain in other installed plugins or themes, as the vulnerability alone does not enable these actions.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should update the Smart Post Show – Post Grid, Post Carousel & Slider, and List Category Posts plugin for WordPress to a version later than 3.0.12 where the issue is fixed.

Additionally, since the vulnerability requires Administrator-level access and a POP chain from another plugin or theme to be exploitable, reviewing and limiting installed plugins and themes to trusted sources can reduce risk.


Can you explain this vulnerability to me?

The vulnerability exists in the Smart Post Show – Post Grid, Post Carousel & Slider, and List Category Posts plugin for WordPress, affecting all versions up to and including 3.0.12.

It is a PHP Object Injection vulnerability caused by the deserialization of untrusted input in the import_shortcodes() function.

Authenticated attackers with Administrator-level access or higher can exploit this to inject a PHP Object.

However, the vulnerability alone does not have an impact unless another plugin or theme containing a POP (Property Oriented Programming) chain is installed on the site.

If such a POP chain is present, the attacker may be able to delete files, retrieve sensitive data, or execute code depending on the POP chain.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows authenticated attackers with Administrator-level access to potentially execute code, delete arbitrary files, or retrieve sensitive data if a gadget chain (POP chain) is present via another plugin or theme. Such unauthorized access and data exposure could lead to violations of data protection regulations like GDPR or HIPAA, which require safeguarding sensitive data and ensuring system integrity.

However, the vulnerability itself requires additional conditions (presence of a POP chain in other installed software) to be exploitable, and it does not directly disclose data or cause impact without these conditions.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves PHP Object Injection via the import_shortcodes() function in the Smart Post Show plugin for WordPress, affecting versions up to 3.0.12. Detection typically requires verifying the plugin version and monitoring for suspicious deserialization activity.

To detect if your system is vulnerable, first check the installed version of the Smart Post Show plugin. You can do this by running a command to list WordPress plugins and their versions, for example:

  • wp plugin list --path=/path/to/wordpress | grep smart-post-show

If the version is 3.0.12 or below, the plugin is vulnerable if an attacker has Administrator-level access.

Additionally, monitoring web server logs for suspicious POST requests that invoke the import_shortcodes() function or contain serialized PHP objects may help detect exploitation attempts.

A sample command to search for suspicious serialized PHP objects in logs could be:

  • grep -r 'O:' /var/log/apache2/access.log

Note that detection is complicated by the requirement of another plugin or theme containing a POP chain for exploitation to be successful.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart