CVE-2026-3328 PUBLISHED

Frontend Admin by DynamiApps <= 3.28.31 - Authenticated (Editor+) PHP Object Injection via 'post_content' of Admin Form Posts

Assigner: Wordfence
Reserved: 27.02.2026 Published: 26.03.2026 Updated: 26.03.2026

The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to PHP Object Injection via deserialization of the 'post_content' of admin_form posts in all versions up to, and including, 3.28.31. This is due to the use of WordPress's maybe_unserialize() function without class restrictions on user-controllable content stored in admin_form post content. This makes it possible for authenticated attackers, with Editor-level access and above, to inject a PHP Object. The additional presence of a POP chain allows attackers to achieve remote code execution.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS Score: 7.2

Product Status

Vendor shabti
Product Frontend Admin by DynamiApps
Versions Default: unaffected
  • affected from * to 3.28.31 (incl.)

Credits

  • Osvaldo Noe Gonzalez Del Rio finder

References

Problem Types

  • CWE-502 Deserialization of Untrusted Data CWE