Description
Deserialization of Untrusted Data vulnerability in Melapress MelaPress Login Security melapress-login-security allows Object Injection.This issue affects MelaPress Login Security: from n/a through <= 2.1.0.
Published: 2025-04-16
Score: 6.6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Melapress Login Security plugin for WordPress contains a deserialization fault that permits untrusted data to be treated as serialised PHP objects, enabling an attacker to trigger PHP object injection. This weakness (CWE‑502) can lead to remote code execution if crafted payloads are processed by the plugin, potentially compromising the entire WordPress site and any underlying servers. The CVSS score of 6.6 indicates a moderate severity, and the EPSS score of < 1% indicates a low likelihood of exploitation at the moment, though the known exploitation vector remains possible.

Affected Systems

It affects the Melapress MelaPress Login Security plugin for WordPress. Vendors are Melapress, and the product is the Login Security plug‑in. All releases from the earliest documented version up to and including version 2.1.0 are vulnerable. Site administrators running any of these versions should consider the plug‑in as unpatched.

Risk and Exploitability

The vulnerability is exploitable through the plug‑in’s deserialization of data received from the web interface or any user‑supplied input that the plug‑in processes. An attacker could craft a serialised object payload, compromise PHP’s object creation mechanism, and execute arbitrary code on the server. Despite the low EPSS score, the lack of any release notes in the KEV catalog does not preclude exploitation. Sites with the affected plug‑in, especially those exposed to the public internet, are at moderate risk if not mitigated. The attack vector is likely via web requests to the plug‑in’s endpoints, requiring the site to be publicly reachable.

Generated by OpenCVE AI on April 30, 2026 at 22:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Melapress Login Security plug‑in to the latest release newer than 2.1.0, which contains a fix for the deserialization issue.
  • If an upgrade is not currently feasible, disable and optionally delete the plug‑in from the WordPress installation to eliminate the attack surface.
  • Verify that the WordPress installation and any custom code do not perform untrusted deserialization or use the old plug‑in’s functions; if they do, sanitize or refactor the code to use secure practices.

Generated by OpenCVE AI on April 30, 2026 at 22:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-11315 Deserialization of Untrusted Data vulnerability in Melapress MelaPress Login Security allows Object Injection. This issue affects MelaPress Login Security: from n/a through 2.1.0.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 6.6, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in Melapress MelaPress Login Security allows Object Injection. This issue affects MelaPress Login Security: from n/a through 2.1.0. Deserialization of Untrusted Data vulnerability in Melapress MelaPress Login Security melapress-login-security allows Object Injection.This issue affects MelaPress Login Security: from n/a through <= 2.1.0.
Title WordPress MelaPress Login Security <= 2.1.0 - PHP Object Injection Vulnerability WordPress MelaPress Login Security plugin <= 2.1.0 - PHP Object Injection Vulnerability
References
Metrics cvssV3_1

{'score': 6.6, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Thu, 17 Jul 2025 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Melapress
Melapress melapress Login Security
CPEs cpe:2.3:a:melapress:melapress_login_security:*:*:*:*:free:wordpress:*:*
Vendors & Products Melapress
Melapress melapress Login Security

Wed, 16 Apr 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 16 Apr 2025 12:45:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in Melapress MelaPress Login Security allows Object Injection. This issue affects MelaPress Login Security: from n/a through 2.1.0.
Title WordPress MelaPress Login Security <= 2.1.0 - PHP Object Injection Vulnerability
Weaknesses CWE-502
References
Metrics cvssV3_1

{'score': 6.6, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Melapress Melapress Login Security
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:34.854Z

Reserved: 2025-04-16T06:25:01.732Z

Link: CVE-2025-39565

cve-icon Vulnrichment

Updated: 2025-04-16T13:13:40.182Z

cve-icon NVD

Status : Modified

Published: 2025-04-16T13:15:49.250

Modified: 2026-04-23T15:29:47.960

Link: CVE-2025-39565

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T22:45:03Z

Weaknesses