Critical code_pattern
Resolved · benign_architectural_concern
2026-04-30 15:25:28 (2d ago)
| Slug | fv-wordpress-flowplayer |
|---|---|
| Pattern | unserialize_after_remote_call |
| Kind | builtin |
| Version | 7.5.49.7212 |
| Hit count | 1 |
| First hit |
|
| Explanation | a remote HTTP fetch (`wp_remote_*` / `curl_exec`) is followed by `@unserialize` within the same file — classic PHP Object Injection C2 gadget. The error-suppressed form is the tell: legit code wants to know when deserialize fails; attackers suppress so malformed gadgets do not leak. A real finding regardless of author intent: any plugin that deserializes remote responses without validation is a latent RCE chain if the remote endpoint is ever compromised. |
View raw JSON
{
"slug": "fv-wordpress-flowplayer",
"pattern": "unserialize_after_remote_call",
"kind": "builtin",
"version": "7.5.49.7212",
"hit_count": 1,
"first_hit": {
"file": "includes/fp-api-private.php",
"line": 397,
"snippet": "L387: $raw_response = wp_remote_post( $this->strPrivateAPI, $request ); \u2192 L397: $response = @unserialize( preg_replace( '~^/\\*[\\s\\S]*?\\*/\\s+~', '', $raw_respons"
},
"explanation": "a remote HTTP fetch (`wp_remote_*` / `curl_exec`) is followed by `@unserialize` within the same file \u2014 classic PHP Object Injection C2 gadget. The error-suppressed form is the tell: legit code wants to know when deserialize fails; attackers suppress so malformed gadgets do not leak. A real finding regardless of author intent: any plugin that deserializes remote responses without validation is a latent RCE chain if the remote endpoint is ever compromised."
}