Critical code_pattern
FluentSMTP – WP SMTP Plugin with Amazon SES, SendGrid, MailGun, Postmark, Google and Any SMTP Provider Resolved · no_longer_matches
7d ago
| Slug | fluent-smtp |
|---|---|
| Pattern | unserialize_after_remote_call |
| Kind | builtin |
| Version | 2.2.95 |
| Hit count | 1 |
| First hit |
|
| Explanation | a remote HTTP fetch (`wp_remote_*`/`curl_exec`/`file_get_contents`) is followed by `@unserialize` within the same file — classic PHP Object Injection C2 gadget used by EP and most WP supply-chain backdoors. The error-suppressed form is the tell: legit code wants to know when deserialize fails; attackers suppress so malformed gadgets do not leak. |
View raw JSON
{
"slug": "fluent-smtp",
"pattern": "unserialize_after_remote_call",
"kind": "builtin",
"version": "2.2.95",
"hit_count": 1,
"first_hit": {
"file": "app/Services/NotificationHelper.php",
"line": 328,
"snippet": "L312: $body = wp_remote_retrieve_body($response); \u2192 L328: $sendingTo = self::unserialize(Arr::get($logData, 'to'));"
},
"explanation": "a remote HTTP fetch (`wp_remote_*`/`curl_exec`/`file_get_contents`) is followed by `@unserialize` within the same file \u2014 classic PHP Object Injection C2 gadget used by EP and most WP supply-chain backdoors. The error-suppressed form is the tell: legit code wants to know when deserialize fails; attackers suppress so malformed gadgets do not leak."
}