Description
Deserialization of Untrusted Data vulnerability in wpWax HelpGent helpgent allows Object Injection.This issue affects HelpGent: from n/a through <= 2.2.5.
Published: 2025-04-17
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

HelpGent plugin deserializes data supplied by users without validating the format, creating an Object Injection vector. An attacker can send a crafted serialized PHP object that, when processed by the plugin, executes arbitrary PHP code. This allows full control of the affected WordPress site, leading to data exfiltration, site defacement or worse. The weakness is classified as CWE-502: Deserialization of Untrusted Data.

Affected Systems

All installations of the wpWax HelpGent plugin from the earliest version up to and including 2.2.5 are affected. No specific WordPress core or other plugin versions are mentioned, so any WordPress site using HelpGent ≤ 2.2.5 is at risk.

Risk and Exploitability

The CVSS score of 9.8 indicates a critical severity, while the EPSS score of less than 1% suggests that exploitation is presently unlikely, though the vulnerability remains available. The vulnerability is not listed in the CISA KEV catalog, meaning that known exploitation has not been reported. Based on the description, the likely attack vector is remote via web requests that trigger the plugin’s deserialization logic, possibly through plugin settings pages or API endpoints. An attacker can craft malicious input, cause object injection, and execute code on the server without authentication, assuming the plugin does not enforce any access controls on the data it deserializes.

Generated by OpenCVE AI on April 30, 2026 at 22:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade wpWax HelpGent to a version newer than 2.2.5, available through the WordPress plugin repository or vendor site.
  • Disable or delete the plugin if an upgrade is not feasible to immediately remove the object injection vector.
  • Keep WordPress core, themes, and all other plugins updated, and consider applying a Web Application Firewall that blocks malicious serialized payloads.

Generated by OpenCVE AI on April 30, 2026 at 22:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-11727 Deserialization of Untrusted Data vulnerability in wpWax HelpGent allows Object Injection. This issue affects HelpGent: from n/a through 2.2.4.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in wpWax HelpGent allows Object Injection. This issue affects HelpGent: from n/a through 2.2.4. Deserialization of Untrusted Data vulnerability in wpWax HelpGent helpgent allows Object Injection.This issue affects HelpGent: from n/a through <= 2.2.5.
Title WordPress HelpGent plugin <= 2.2.4 - PHP Object Injection vulnerability WordPress HelpGent plugin <= 2.2.5 - PHP Object Injection vulnerability
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Thu, 17 Apr 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 17 Apr 2025 16:00:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in wpWax HelpGent allows Object Injection. This issue affects HelpGent: from n/a through 2.2.4.
Title WordPress HelpGent plugin <= 2.2.4 - PHP Object Injection vulnerability
Weaknesses CWE-502
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:27.411Z

Reserved: 2025-04-09T11:21:11.059Z

Link: CVE-2025-32658

cve-icon Vulnrichment

Updated: 2025-04-17T17:42:42.640Z

cve-icon NVD

Status : Deferred

Published: 2025-04-17T16:15:49.687

Modified: 2026-04-23T15:29:17.740

Link: CVE-2025-32658

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T22:15:16Z

Weaknesses