Description
Deserialization of Untrusted Data vulnerability in emarket-design WP Easy Contact wp-easy-contact allows Object Injection.This issue affects WP Easy Contact: from n/a through <= 4.0.1.
Published: 2025-08-28
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a deserialization of untrusted data flaw that allows PHP object injection in the WordPress WP Easy Contact plugin. If an attacker can provide crafted serialized data to the plugin, they can instantiate arbitrary PHP objects, potentially leading to remote code execution, tampering of site configuration, or unauthorized data access. The weakness is classified as CWE‑502, a data-related flaw that permits manipulation of object state during deserialization.

Affected Systems

The affected product is the WP Easy Contact plugin developed by emarket-design. Versions from the earliest release through and including 4.0.1 are vulnerable. No later version is specified as affected, so any deployment running a version ≤4.0.1 should be considered at risk.

Risk and Exploitability

The CVSS score of 8.1 reflects a high severity impact, while the EPSS score of < 1% indicates that exploitation likelihood is currently low but non-zero. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector involves sending crafted serialized data to the plugin’s deserialization point via form submissions or specially crafted URLs. Successful exploitation would grant the attacker privileged access to the server environment running the WordPress instance. The combination of high impact and low but present exploitation probability warrants immediate attention.

Generated by OpenCVE AI on April 30, 2026 at 15:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade WP Easy Contact to version 4.0.2 or later, which resolves the deserialization flaw
  • If an immediate upgrade is not possible, deactivate or uninstall the plugin to block the vulnerability surface
  • Implement strict input validation or enable WordPress’s built‑in middleware to reject serialized data from non‑trusted sources

Generated by OpenCVE AI on April 30, 2026 at 15:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-25987 Deserialization of Untrusted Data vulnerability in emarket-design WP Easy Contact allows Object Injection. This issue affects WP Easy Contact: from n/a through 4.0.1.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in emarket-design WP Easy Contact allows Object Injection. This issue affects WP Easy Contact: from n/a through 4.0.1. Deserialization of Untrusted Data vulnerability in emarket-design WP Easy Contact wp-easy-contact allows Object Injection.This issue affects WP Easy Contact: from n/a through <= 4.0.1.
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Thu, 28 Aug 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Emarketdesign
Emarketdesign wp Easy Contact
Wordpress
Wordpress wordpress
Vendors & Products Emarketdesign
Emarketdesign wp Easy Contact
Wordpress
Wordpress wordpress

Thu, 28 Aug 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 28 Aug 2025 13:00:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in emarket-design WP Easy Contact allows Object Injection. This issue affects WP Easy Contact: from n/a through 4.0.1.
Title WordPress WP Easy Contact Plugin <= 4.0.1 - PHP Object Injection Vulnerability
Weaknesses CWE-502
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Emarketdesign Wp Easy Contact
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:26.630Z

Reserved: 2025-07-03T14:51:06.794Z

Link: CVE-2025-53572

cve-icon Vulnrichment

Updated: 2025-08-28T14:04:10.872Z

cve-icon NVD

Status : Deferred

Published: 2025-08-28T13:16:04.550

Modified: 2026-04-23T15:32:37.573

Link: CVE-2025-53572

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T15:45:40Z

Weaknesses