Impact
Deserialization of untrusted data in the Constant Contact for WordPress plugin allows attackers to perform object injection, which could enable execution of arbitrary PHP code, compromising the confidentiality, integrity, or availability of the host system. This vulnerability has a CVSS score of 8.8, indicating high severity.
Affected Systems
The weakness affects the Constant Contact for WordPress plugin by webdevstudios, versions up to and including 4.1.1. No patched version exists; the plugin has been permanently closed and is no longer available for download.
Risk and Exploitability
The EPSS score is less than 1%, suggesting low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog. Attackers could potentially trigger the deserialization path through normal plugin functionality or specially crafted web requests; the exact entry point is not specified, but it is inferred that the plugin processes user-supplied data without adequate validation.
OpenCVE Enrichment
EUVD