Description
Deserialization of Untrusted Data vulnerability in magepeopleteam WpEvently mage-eventpress allows Object Injection.This issue affects WpEvently: from n/a through <= 4.4.8.
Published: 2025-08-28
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a deserialization flaw that permits PHP Object Injection in the WpEvently plugin for WordPress. An attacker can supply crafted serialized data that is parsed by the plugin, potentially leading to arbitrary code execution on the hosting server. The nature of the flaw is a CWE‑502 type vulnerability, which can compromise confidentiality, integrity, and availability of the affected web application.

Affected Systems

WordPress sites that have the magepeopleteam WpEvently (mage‑eventpress) plugin with a version of 4.4.8 or earlier are affected. The plugin version information indicates the flaw exists in all releases up to and including 4.4.8.

Risk and Exploitability

The CVSS score of 8.8 indicates a high severity level. The EPSS score of less than 1% shows that exploit attempts are statistically unlikely at this time, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is remote, inferred from the nature of the deserialization flaw and typical WordPress traffic patterns. An attacker would need to supply malicious serialized input to a path processed by the plugin, which is obtainable by interacting with the plugin’s exposed endpoints. The high severity, combined with the possibility of arbitrary code execution, warrants careful attention even though the exploitation probability is low.

Generated by OpenCVE AI on April 30, 2026 at 03:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the WpEvently plugin to the latest version that removes the insecure deserialization practice. Even though a specific patch version is not listed, any update beyond 4.4.8 is expected to fix the flaw.
  • If an upgrade is not immediately possible, disable the plugin entirely until a fixed release is available, or remove its files from the public web root to prevent exposure to attackers.
  • When the plugin must remain in use, restrict access to its functionality by limiting usage to trusted administrators and ensuring validated input is never passed to PHP’s unserialize function; consider implementing a custom unserialize guard or using a secure deserialization library compliant with CWE‑502 mitigation guidelines.

Generated by OpenCVE AI on April 30, 2026 at 03:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-25969 Deserialization of Untrusted Data vulnerability in magepeopleteam WpEvently allows Object Injection. This issue affects WpEvently: from n/a through 4.4.8.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in magepeopleteam WpEvently allows Object Injection. This issue affects WpEvently: from n/a through 4.4.8. Deserialization of Untrusted Data vulnerability in magepeopleteam WpEvently mage-eventpress allows Object Injection.This issue affects WpEvently: from n/a through <= 4.4.8.
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Thu, 28 Aug 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 28 Aug 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 28 Aug 2025 13:00:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in magepeopleteam WpEvently allows Object Injection. This issue affects WpEvently: from n/a through 4.4.8.
Title WordPress WpEvently Plugin <= 4.4.8 - PHP Object Injection Vulnerability
Weaknesses CWE-502
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:36.761Z

Reserved: 2025-07-28T10:56:41.543Z

Link: CVE-2025-54742

cve-icon Vulnrichment

Updated: 2025-08-28T13:26:04.796Z

cve-icon NVD

Status : Deferred

Published: 2025-08-28T13:16:09.530

Modified: 2026-04-23T15:32:55.363

Link: CVE-2025-54742

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T03:15:26Z

Weaknesses