Description
Deserialization of Untrusted Data vulnerability in magepeopleteam WpBookingly service-booking-manager allows Object Injection.This issue affects WpBookingly: from n/a through <= 1.3.0.
Published: 2025-04-11
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Deserialization of untrusted data in the magepeopleteam WpBookingly service-booking-manager plugin enables an attacker to perform PHP Object Injection. The vulnerability can allow execution of arbitrary PHP code, compromising confidentiality, integrity and availability of the WordPress site and any connected services. It is a critical weakness under CWE-502 and can lead to full system compromise if exploited.

Affected Systems

WordPress sites running the WpBookingly plugin version 1.3.0 or earlier are affected. The issue impacts any installation that has not applied the newer plugin versions released after 1.3.0.

Risk and Exploitability

The CVSS score of 9.8 indicates high severity, while the EPSS score of less than 1% suggests very low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that attackers can exploit this by crafting requests to the service-booking-manager endpoint and sending deserialized data; the attack would require legitimate access to the plugin’s front-end or back-end and the ability to inject serialized data. Once exploited, arbitrary code execution can be achieved.

Generated by OpenCVE AI on May 1, 2026 at 10:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade WpBookingly to a version newer than 1.3.0
  • If an upgrade is not available, disable or delete the WpBookingly plugin from the WordPress installation
  • Use input validation to ensure only trusted data is deserialized, or configure the application to disable PHP object serialization for that plugin

Generated by OpenCVE AI on May 1, 2026 at 10:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-10758 Deserialization of Untrusted Data vulnerability in magepeopleteam WpBookingly allows Object Injection. This issue affects WpBookingly: from n/a through 1.2.0.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in magepeopleteam WpBookingly allows Object Injection. This issue affects WpBookingly: from n/a through 1.2.0. Deserialization of Untrusted Data vulnerability in magepeopleteam WpBookingly service-booking-manager allows Object Injection.This issue affects WpBookingly: from n/a through <= 1.3.0.
Title WordPress WpBookingly plugin <= 1.2.0 - PHP Object Injection vulnerability WordPress WpBookingly plugin <= 1.3.0 - PHP Object Injection vulnerability
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Fri, 11 Apr 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 11 Apr 2025 09:00:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in magepeopleteam WpBookingly allows Object Injection. This issue affects WpBookingly: from n/a through 1.2.0.
Title WordPress WpBookingly plugin <= 1.2.0 - PHP Object Injection vulnerability
Weaknesses CWE-502
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:25.206Z

Reserved: 2025-04-09T11:20:35.408Z

Link: CVE-2025-32607

cve-icon Vulnrichment

Updated: 2025-04-11T15:01:17.620Z

cve-icon NVD

Status : Deferred

Published: 2025-04-11T09:15:32.140

Modified: 2026-04-23T15:29:12.037

Link: CVE-2025-32607

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T10:45:05Z

Weaknesses