Impact
WordPress JupiterX Core plugin allows Object Injection through deserialization of untrusted data. An attacker can create a malicious serialized payload that the plugin processes, which may result in arbitrary code execution on the hosting server. This flaw maps to CWE‑502, a high‑severity weakness that facilitates remote code execution without authentication.
Affected Systems
The vulnerability affects all releases of the JupiterX Core plugin from artbees up to and including version 4.10.1. WordPress sites running any of these versions are potentially exploitable. Versions released after 4.10.1 are not listed as affected, implying a patch may exist.
Risk and Exploitability
The CVSS base score of 8.8 reflects a high severity vulnerability, yet the EPSS of less than 1% indicates a very low degree of real‑world exploitation risk at present. The weakness is not in the CISA KEV catalog. Based on the description, the likely attack vector is an HTTP request transmitting crafted serialized data to an endpoint that processes it.
OpenCVE Enrichment