Description
Deserialization of Untrusted Data vulnerability in Cristián Lávaque s2Member s2member allows Object Injection.This issue affects s2Member: from n/a through <= 250701.
Published: 2025-11-06
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a deserialization of untrusted data that allows an attacker to perform PHP object injection within the s2Member WordPress plugin. This weakness can enable the attacker to create arbitrary objects, potentially leading to remote code execution or escalation of privileges on the hosting server (inferred from the capability to instantiate malicious objects). The issue is identified as a CWE‑502 vulnerability, which is known to allow attackers to manipulate serialized data and inject malicious objects that bypass normal security checks.

Affected Systems

The s2Member plugin, developed by Cristián Lávaque, is affected in all releases up to and including version 250701. WordPress sites that have this plugin installed and have not upgraded past that version are susceptible. The exact minimum affected version is not specified, but any instance of the plugin that is ≤ 250701 is vulnerable.

Risk and Exploitability

The CVSS score of 9.8 marks it as critical. The EPSS score of < 1 % suggests a very low current probability of exploitation, but the high severity means a successful exploit would be devastating. The vulnerability is not in the CISA KEV catalog. An attacker could potentially exploit it remotely by sending a crafted serialized object via a web request to the plugin, assuming the site allows user input that is deserialized without proper validation; this could lead to remote code execution (inferred). Because the weakness is a PHP object injection, it can bypass normal authorization checks if the attacker can submit data to the plugin’s entry point.

Generated by OpenCVE AI on April 29, 2026 at 16:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the s2Member WordPress plugin to the latest available release (greater than 250701) to remove the vulnerable deserialization code.
  • If the plugin is not essential, disable or uninstall it to eliminate the attack surface immediately.
  • Restrict PHP object deserialization by configuring PHP’s unserialize function with the $allowed_classes parameter set to an empty array or by using safe serialization libraries, ensuring that no untrusted data is ever unserialized.
  • Conduct a security review of any custom code that interacts with s2Member to confirm no other deserialization points exist; monitor logs for unusual serialized payloads and apply web application firewall rules to block malicious serialization attempts.

Generated by OpenCVE AI on April 29, 2026 at 16:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Mon, 17 Nov 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 13 Nov 2025 11:30:00 +0000


Thu, 13 Nov 2025 10:45:00 +0000


Fri, 07 Nov 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared S2member
S2member s2member
Wordpress
Wordpress wordpress
Vendors & Products S2member
S2member s2member
Wordpress
Wordpress wordpress

Thu, 06 Nov 2025 16:00:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in Cristián Lávaque s2Member s2member allows Object Injection.This issue affects s2Member: from n/a through <= 250701.
Title WordPress s2Member Plugin <= 250701 - PHP Object Injection Vulnerability
Weaknesses CWE-502
References

Subscriptions

S2member S2member
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T20:17:19.331Z

Reserved: 2025-09-06T04:45:29.150Z

Link: CVE-2025-58998

cve-icon Vulnrichment

Updated: 2025-11-17T15:48:22.445Z

cve-icon NVD

Status : Deferred

Published: 2025-11-06T16:16:01.290

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-58998

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T16:30:15Z

Weaknesses