Description
Deserialization of Untrusted Data vulnerability in CRM Perks WP Gravity Forms Zoho CRM and Bigin gf-zoho allows Object Injection.This issue affects WP Gravity Forms Zoho CRM and Bigin: from n/a through <= 1.2.9.
Published: 2025-12-18
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a deserialization of untrusted data flaw in the WP Gravity Forms Zoho CRM and Bigin plugin. It allows an attacker to craft and inject malicious PHP objects, effectively creating a deserialization-based object injection vector. This weakness, identified as CWE‑502, can lead to arbitrary code execution or unauthorized data manipulation once the input is processed by the plugin. The affected entity is the CRM Perks WP Gravity Forms Zoho CRM and Bigin WordPress plugin. Versions through 1.2.9 are compromised, meaning any site running the plugin at that version or earlier has no protection against the deserialization flaw. The CVSS score of 9.8 labels the issue as critical. The EPSS metric indicates a very low but non‑zero chance of exploitation, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is most likely remote, relying on the plugin’s data handling routines; it probably does not require authentication, but the precise prerequisites are not explicitly detailed, so the safest assumption is that unauthenticated users can supply untrusted data.

Affected Systems

The flaw affects the CRM Perks WP Gravity Forms Zoho CRM and Bigin plugin for WordPress, specifically any installation of the plugin at version 1.2.9 or earlier.

Risk and Exploitability

With a 9.8 CVSS rating the flaw is considered critical. The EPSS score of <1% suggests exploitation is presently unlikely, yet the severity warrants vigilance. Because the vulnerability is not in the KEV catalog it has not yet been reported as a widely used exploit, but the potential for remote code execution is significant.

Generated by OpenCVE AI on April 29, 2026 at 13:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the WP Gravity Forms Zoho CRM and Bigin plugin to version 1.3.0 or later.
  • If an upgrade is not immediately possible, deactivate the gf‑zoho plugin to prevent potential exploitation.
  • Consider removing the plugin entirely and replacing it with a trusted alternative if it is no longer required.

Generated by OpenCVE AI on April 29, 2026 at 13:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Wed, 31 Dec 2025 22:00:00 +0000

Type Values Removed Values Added
First Time appeared Crmperks
Crmperks wp Gravity Forms Zoho Crm And Bigin
CPEs cpe:2.3:a:crmperks:wp_gravity_forms_zoho_crm_and_bigin:*:*:*:*:*:wordpress:*:*
Vendors & Products Crmperks
Crmperks wp Gravity Forms Zoho Crm And Bigin

Fri, 19 Dec 2025 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Crm Perks
Crm Perks wp Gravity Forms Zoho Crm And Bigin
Wordpress
Wordpress wordpress
Vendors & Products Crm Perks
Crm Perks wp Gravity Forms Zoho Crm And Bigin
Wordpress
Wordpress wordpress

Thu, 18 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 18 Dec 2025 07:45:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in CRM Perks WP Gravity Forms Zoho CRM and Bigin gf-zoho allows Object Injection.This issue affects WP Gravity Forms Zoho CRM and Bigin: from n/a through <= 1.2.9.
Title WordPress WP Gravity Forms Zoho CRM and Bigin plugin <= 1.2.9 - Deserialization of untrusted data vulnerability
Weaknesses CWE-502
References

Subscriptions

Crm Perks Wp Gravity Forms Zoho Crm And Bigin
Crmperks Wp Gravity Forms Zoho Crm And Bigin
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T18:38:08.818Z

Reserved: 2025-09-25T15:20:09.847Z

Link: CVE-2025-60091

cve-icon Vulnrichment

Updated: 2025-12-18T15:51:57.505Z

cve-icon NVD

Status : Modified

Published: 2025-12-18T08:16:09.343

Modified: 2026-01-20T15:17:27.597

Link: CVE-2025-60091

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T13:15:11Z

Weaknesses