Bold Page Builder <= 3.1.5 - PHP Object Injection

Deserialization of Untrusted Data
CVE CVE-2021-24579
CVSS High (7.5)
Publicly Published August 2, 2021
Last Updated January 22, 2024
Researcher dc11
Description

The bt_bb_get_grid AJAX action of the Bold Page Builder WordPress plugin before 3.1.6 passes user input into the unserialize() function without any validation or sanitisation, which could lead to a PHP Object Injection. Even though the plugin did not contain a suitable gadget to fully exploit the issue, other installed plugins on the blog could allow such issue to be exploited and lead to RCE in some cases.

References

1 affected software package

Software Type Plugin
Software Slug bold-page-builder (view on wordpress.org)
Patched? Yes
Affected Version
  • <= 3.1.5
Patched Version
  • 3.1.6
This record contains material that is subject to copyright

Copyright 2012-2026 Defiant Inc.
License: Defiant hereby grants you a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare derivative works of, publicly display, publicly perform, sublicense, and distribute this software vulnerability information. Any copy of the software vulnerability information you make for such purposes is authorized provided that you include a hyperlink to this vulnerability record and reproduce Defiant's copyright designation and this license in any such copy. License Detail.