Description
Deserialization of Untrusted Data vulnerability in PickPlugins Question Answer question-answer allows Object Injection.This issue affects Question Answer: from n/a through <= 1.2.73.
Published: 2025-04-17
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a deserialization of untrusted data flaw in PickPlugins Question Answer that enables PHP Object Injection. This flaw allows an attacker to craft malicious payloads that, when deserialized by the plugin, can lead to remote code execution on the WordPress site. The weakness is identified as CWE‑502 (Deserialization of Untrusted Data).

Affected Systems

All installations of PickPlugins WordPress Question Answer plugin from the initial release up to version 1.2.73 are potentially affected. The plugin is common in WordPress sites that host community Q&A features.

Risk and Exploitability

The CVSS score of 8.8 indicates a high‑severity vulnerability, while the EPSS score of less than 1% suggests that exploitation is currently considered unlikely, yet not impossible. The vulnerability is not listed in CISA KEV, indicating no widespread actively exploited incidents have been reported, but PHP Object Injection can provide an attacker with arbitrary code execution, warranting careful attention.

Generated by OpenCVE AI on May 1, 2026 at 09:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Question Answer plugin to the latest version available, ensuring it is newer than 1.2.73.
  • If an update cannot be applied immediately, remove or disable the plugin entirely.
  • After updating, monitor the site logs for anomalous deserialization attempts and ensure application functionality is intact.
  • Implement a web application firewall rule that blocks suspicious serialization patterns until the plugin is updated.

Generated by OpenCVE AI on May 1, 2026 at 09:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-11720 Deserialization of Untrusted Data vulnerability in PickPlugins Question Answer allows Object Injection. This issue affects Question Answer: from n/a through 1.2.70.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in PickPlugins Question Answer allows Object Injection. This issue affects Question Answer: from n/a through 1.2.70. Deserialization of Untrusted Data vulnerability in PickPlugins Question Answer question-answer allows Object Injection.This issue affects Question Answer: from n/a through <= 1.2.73.
Title WordPress Question Answer Plugin <= 1.2.70 - PHP Object Injection vulnerability WordPress Question Answer plugin <= 1.2.73 - PHP Object Injection vulnerability
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Thu, 17 Apr 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 17 Apr 2025 16:00:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in PickPlugins Question Answer allows Object Injection. This issue affects Question Answer: from n/a through 1.2.70.
Title WordPress Question Answer Plugin <= 1.2.70 - PHP Object Injection vulnerability
Weaknesses CWE-502
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:26.890Z

Reserved: 2025-04-09T11:21:04.029Z

Link: CVE-2025-32647

cve-icon Vulnrichment

Updated: 2025-04-17T17:41:18.144Z

cve-icon NVD

Status : Deferred

Published: 2025-04-17T16:15:48.770

Modified: 2026-04-23T15:29:16.617

Link: CVE-2025-32647

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T10:00:12Z

Weaknesses