{"id":"CVE-2013-4338","details":"wp-includes/functions.php in WordPress before 3.6.1 does not properly determine whether data has been serialized, which allows remote attackers to execute arbitrary code by triggering erroneous PHP unserialize operations.","modified":"2026-02-04T22:15:56.448883Z","published":"2013-09-12T13:28:37Z","related":["MGASA-2013-0285"],"references":[{"type":"ADVISORY","url":"http://codex.wordpress.org/Version_3.6.1"},{"type":"ADVISORY","url":"http://wordpress.org/news/2013/09/wordpress-3-6-1/"},{"type":"ADVISORY","url":"http://www.debian.org/security/2013/dsa-2757"},{"type":"EVIDENCE","url":"http://core.trac.wordpress.org/changeset/25325"},{"type":"FIX","url":"http://core.trac.wordpress.org/changeset/25325"},{"type":"FIX","url":"http://wordpress.org/news/2013/09/wordpress-3-6-1/"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-September/116828.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-September/116832.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-September/117118.html"}],"schema_version":"1.7.3"}