Description
Deserialization of Untrusted Data vulnerability in Crocoblock JetEngine jet-engine allows Code Injection.This issue affects JetEngine: from n/a through <= 3.7.0.
Published: 2025-08-20
Score: 8.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Deserialization of untrusted data in Crocoblock JetEngine allows code injection, enabling an attacker to execute arbitrary code on the affected WordPress installation. The flaw leads to a high impact Remote Code Execution vulnerability, potentially compromising confidentiality, integrity, and availability of the system. The weakness is represented by CWE-82, indicating improper handling of untrusted serialized data.

Affected Systems

Crocoblock’s JetEngine plugin for WordPress is affected in all releases from the initial version through 3.7.0. Any WordPress site that has JetEngine installed at a version equal to or lower than 3.7.0 is vulnerable.

Risk and Exploitability

The CVSS score of 8.5 categorizes this flaw as high severity, while the EPSS score of less than 1% indicates a low probability of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is remote, involving the submission of crafted serialized data to JetEngine’s input handling endpoints. No additional exploitation prerequisites are indicated, suggesting that any user able to submit data processed by the plugin could potentially trigger code execution.

Generated by OpenCVE AI on April 30, 2026 at 08:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade JetEngine to version 3.7.1 or newer, where the deserialization handling issue is resolved.
  • If an upgrade is not immediately possible, disable or remove JetEngine from the site until the patch is applied, or restrict its plugin functionality to trusted administrators only.
  • Monitor WordPress logs for anomalous serialized payloads and enforce strict input validation on any remaining JetEngine endpoints to reduce the risk of exploitation.

Generated by OpenCVE AI on April 30, 2026 at 08:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-25368 Improper Neutralization of Special Elements Used in a Template Engine vulnerability in Crocoblock JetEngine allows Code Injection. This issue affects JetEngine: from n/a through 3.7.0.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Special Elements Used in a Template Engine vulnerability in Crocoblock JetEngine allows Code Injection. This issue affects JetEngine: from n/a through 3.7.0. Deserialization of Untrusted Data vulnerability in Crocoblock JetEngine jet-engine allows Code Injection.This issue affects JetEngine: from n/a through <= 3.7.0.
Weaknesses CWE-1336 CWE-82
References
Metrics cvssV3_1

{'score': 8.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}


Thu, 21 Aug 2025 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Crocoblock
Crocoblock jetengine
Wordpress
Wordpress wordpress
Vendors & Products Crocoblock
Crocoblock jetengine
Wordpress
Wordpress wordpress

Wed, 20 Aug 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 20 Aug 2025 08:15:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Special Elements Used in a Template Engine vulnerability in Crocoblock JetEngine allows Code Injection. This issue affects JetEngine: from n/a through 3.7.0.
Title WordPress JetEngine <= 3.7.0 - Remote Code Execution (RCE) Vulnerability
Weaknesses CWE-1336
References
Metrics cvssV3_1

{'score': 8.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

Crocoblock Jetengine
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:20.077Z

Reserved: 2025-06-27T10:27:33.251Z

Link: CVE-2025-53194

cve-icon Vulnrichment

Updated: 2025-08-20T17:44:45.707Z

cve-icon NVD

Status : Deferred

Published: 2025-08-20T08:15:39.350

Modified: 2026-04-23T15:32:16.173

Link: CVE-2025-53194

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T08:45:16Z

Weaknesses