Critical code_pattern
Resolved · no_longer_matches
2026-04-24 15:56:44 (7d ago)
| Slug | essential-addons-for-elementor-lite |
|---|---|
| Pattern | unserialize_after_remote_call |
| Kind | builtin |
| Version | 6.6.2 |
| Hit count | 1 |
| First hit |
|
| Explanation | a remote HTTP fetch (`wp_remote_*`/`curl_exec`) is followed by `unserialize`/`maybe_unserialize` within the same file — classic PHP Object Injection C2 gadget used by EP and most WP supply-chain backdoors. Legit plugins essentially never do this. |
View raw JSON
{
"slug": "essential-addons-for-elementor-lite",
"pattern": "unserialize_after_remote_call",
"kind": "builtin",
"version": "6.6.2",
"hit_count": 1,
"first_hit": {
"file": "includes/Classes/WPDeveloper_Plugin_Installer.php",
"line": 76,
"snippet": "L57: $response = wp_remote_post( \u2192 L76: return unserialize(wp_remote_retrieve_body($response));"
},
"explanation": "a remote HTTP fetch (`wp_remote_*`/`curl_exec`) is followed by `unserialize`/`maybe_unserialize` within the same file \u2014 classic PHP Object Injection C2 gadget used by EP and most WP supply-chain backdoors. Legit plugins essentially never do this."
}