Unrated severityNVD Advisory· Published Sep 16, 2015· Updated May 6, 2026
CVE-2015-6828
CVE-2015-6828
Description
The tweet_info function in class/__functions.php in the SecureMoz Security Audit plugin 1.0.5 and earlier for WordPress does not use an HTTPS session for downloading serialized data, which allows man-in-the-middle attackers to conduct PHP object injection attacks and execute arbitrary PHP code by modifying the client-server data stream. NOTE: some of these details are obtained from third party information.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- www.openwall.com/lists/oss-security/2015/09/05/4nvdExploitMailing ListThird Party Advisory
- www.openwall.com/lists/oss-security/2015/09/06/3nvdExploitMailing ListThird Party Advisory
- wpvulndb.com/vulnerabilities/8179nvdThird Party Advisory
News mentions
0No linked articles in our index yet.