Description
Deserialization of Untrusted Data vulnerability in ThemeMove ThemeMove Core thememove-core allows Object Injection.This issue affects ThemeMove Core: from n/a through <= 1.4.2.
Published: 2025-09-09
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

ThemeMove Core Plugin up to version 1.4.2 contains an insecure deserialization flaw that allows untrusted data to be deserialized into PHP objects. This weakness, classified as CWE-502, can be exploited to inject arbitrary objects, leading to remote code execution on the affected WordPress site. The vulnerability permits an attacker to control or inject code that may run with the privileges of the WordPress installation, potentially compromising the entire website, its data, and any backend services.

Affected Systems

WordPress sites that have the ThemeMove Core plugin installed with a version of 1.4.2 or earlier. The flaw exists in all releases of the plugin from the initial release up through 1.4.2.

Risk and Exploitability

The CVSS base score of 8.8 indicates a high severity that could allow a remote attacker to execute arbitrary code. However, the EPSS score is reported as less than 1%, implying that the probability of an actual widespread exploitation is currently low. The vulnerability is not listed in the CISA KEV catalog, which means there are no known public exploits widely available. Likely attack vectors involve submitting crafted serialized PHP data to a vulnerable endpoint, such as a plugin form or custom UTF-8 payload, which is then inadvertently processed by the application. Successful exploitation would grant the attacker code execution rights on the WordPress host.

Generated by OpenCVE AI on April 30, 2026 at 15:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade ThemeMove Core to a version newer than 1.4.2.
  • If an upgrade is not possible, remove the ThemeMove Core plugin from the WordPress installation entirely.
  • Audit the site for any evidence of malicious serialized PHP data or signs of previous exploitation attempts.
  • Implement strict input validation or disable deserialization of untrusted data where possible to mitigate the attack surface.

Generated by OpenCVE AI on April 30, 2026 at 15:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-27459 Deserialization of Untrusted Data vulnerability in ThemeMove ThemeMove Core allows Object Injection. This issue affects ThemeMove Core: from n/a through 1.4.2.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in ThemeMove ThemeMove Core allows Object Injection. This issue affects ThemeMove Core: from n/a through 1.4.2. Deserialization of Untrusted Data vulnerability in ThemeMove ThemeMove Core thememove-core allows Object Injection.This issue affects ThemeMove Core: from n/a through <= 1.4.2.
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Tue, 09 Sep 2025 23:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 09 Sep 2025 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Thememove
Thememove core
Wordpress
Wordpress wordpress
Vendors & Products Thememove
Thememove core
Wordpress
Wordpress wordpress

Tue, 09 Sep 2025 16:45:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in ThemeMove ThemeMove Core allows Object Injection. This issue affects ThemeMove Core: from n/a through 1.4.2.
Title WordPress ThemeMove Core Plugin <= 1.4.2 - PHP Object Injection Vulnerability
Weaknesses CWE-502
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Thememove Core
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:23.231Z

Reserved: 2025-06-27T11:59:06.866Z

Link: CVE-2025-53303

cve-icon Vulnrichment

Updated: 2025-09-09T17:48:32.923Z

cve-icon NVD

Status : Deferred

Published: 2025-09-09T17:15:48.710

Modified: 2026-04-23T15:32:27.390

Link: CVE-2025-53303

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T15:15:06Z

Weaknesses