Description
Deserialization of Untrusted Data vulnerability in Climax Themes Kata Plus kata-plus allows Object Injection.This issue affects Kata Plus: from n/a through <= 1.5.3.
Published: 2025-04-17
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a Deserialization of Untrusted Data flaw that allows PHP Object Injection via the Climax Themes Kata Plus WordPress plugin. Attackers who can supply crafted serialized data to the plugin can instantiate arbitrary PHP objects, leading to execution of application logic and, ultimately, Remote Code Execution. This weakness is identified as CWE-502 and compromises both confidentiality and integrity of the affected system.

Affected Systems

Climax Themes Kata Plus plugin is affected. Versions from the earliest available release up through 1.5.3 are vulnerable; no earlier safe version is identified in the advisory. Users running any of these versions should consider the plugin as a critical risk.

Risk and Exploitability

The CVSS score of 9.8 categorizes this issue as Critical, indicating a high impact if exploited. The EPSS score of less than 1% suggests that the probability of exploitation in the wild is currently low, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is through web requests that reach plugin code handling serialized input; however, the exact entry point is not explicitly detailed in the advisory and is inferred from the nature of PHP object injection flaws.

Generated by OpenCVE AI on April 30, 2026 at 21:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Kata Plus to the latest available release, which removes the vulnerable deserialization code.
  • If an upgrade is not immediately feasible, disable or delete the Kata Plus plugin to eliminate the vulnerability surface.
  • Review the plugin’s data handling to ensure that any remaining deserialization is performed only on trusted data, and apply input validation or sanitization as a temporary containment measure.

Generated by OpenCVE AI on April 30, 2026 at 21:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-11687 Deserialization of Untrusted Data vulnerability in Climax Themes Kata Plus allows Object Injection. This issue affects Kata Plus: from n/a through 1.5.2.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in Climax Themes Kata Plus allows Object Injection. This issue affects Kata Plus: from n/a through 1.5.2. Deserialization of Untrusted Data vulnerability in Climax Themes Kata Plus kata-plus allows Object Injection.This issue affects Kata Plus: from n/a through <= 1.5.3.
Title WordPress Kata Plus Plugin <= 1.5.2 - PHP Object Injection vulnerability WordPress Kata Plus Plugin <= 1.5.3 - PHP Object Injection vulnerability
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Thu, 17 Apr 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 17 Apr 2025 16:00:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in Climax Themes Kata Plus allows Object Injection. This issue affects Kata Plus: from n/a through 1.5.2.
Title WordPress Kata Plus Plugin <= 1.5.2 - PHP Object Injection vulnerability
Weaknesses CWE-502
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:24.409Z

Reserved: 2025-04-09T11:20:09.347Z

Link: CVE-2025-32572

cve-icon Vulnrichment

Updated: 2025-04-17T17:42:34.639Z

cve-icon NVD

Status : Deferred

Published: 2025-04-17T16:15:44.443

Modified: 2026-04-23T15:29:08.000

Link: CVE-2025-32572

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T22:00:08Z

Weaknesses