CVE-2017-20206

The Appointments plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 2.2.1 via deserialization of untrusted input from the `wpmudev_appointments` cookie. This allows unauthenticated attackers to inject a PHP Object. Attackers were actively exploiting this vulnerability with the WP_Theme() class to create backdoors.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wpmudev:appointments:*:*:*:*:*:wordpress:*:*

History

23 Dec 2025, 17:06

Type Values Removed Values Added
CPE cpe:2.3:a:wpmudev:appointments:*:*:*:*:*:wordpress:*:*
First Time Wpmudev
Wpmudev appointments
References () https://plugins.trac.wordpress.org/changeset/1733186/appointments - () https://plugins.trac.wordpress.org/changeset/1733186/appointments - Patch
References () https://www.wordfence.com/blog/2017/10/3-zero-day-plugin-vulnerabilities-exploited-wild/ - () https://www.wordfence.com/blog/2017/10/3-zero-day-plugin-vulnerabilities-exploited-wild/ - Press/Media Coverage, Third Party Advisory
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/7e8f230e-3f96-4efd-806d-72725b960303?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/7e8f230e-3f96-4efd-806d-72725b960303?source=cve - Third Party Advisory

18 Oct 2025, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-18 04:15

Updated : 2025-12-23 17:06


NVD link : CVE-2017-20206

Mitre link : CVE-2017-20206

CVE.ORG link : CVE-2017-20206


JSON object : View

Products Affected

wpmudev

  • appointments
CWE
CWE-502

Deserialization of Untrusted Data