Description
Deserialization of Untrusted Data vulnerability in designthemes Kriya kriya allows Object Injection.This issue affects Kriya: from n/a through <= 3.4.
Published: 2025-10-22
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a deserialization of untrusted data in the DesignThemes Kriya WordPress theme. An attacker can supply a crafted PHP serialized object that the theme unserializes without proper validation, enabling arbitrary object injection. This flaw could lead to remote code execution or other privilege escalation within the web application, compromising the confidentiality, integrity, and availability of the site.

Affected Systems

DesignThemes Kriya theme used in WordPress installations is affected from unspecified earlier versions up to and including 3.4. Users running any Kriya version 3.4 or earlier that have the unserialize code in place are vulnerable.

Risk and Exploitability

The CVSS score of 8.8 indicates high severity. The EPSS score of less than 1% shows that exploitation, while possible, is currently considered unlikely. The vulnerability is not in the CISA KEV catalog. Attackers would need to send malicious serialized data to the theme, likely via a query parameter, form, or API call. The lack of input validation allows object injection, which can be exploited to execute arbitrary code, modify the application’s behavior, or tamper with stored data.

Generated by OpenCVE AI on April 29, 2026 at 14:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Patch or update the Kriya theme to a version newer than 3.4 where the vulnerable deserialization routine has been removed or mitigated.
  • If an immediate update is not feasible, deactivate the Kriya theme or replace it with a trusted alternative until the vulnerability is fixed.
  • Review and sanitize any user‑supplied data that the theme processes with unserialize, ensuring that only trusted, validated data is deserialized, in line with best practices for CWE‑502.

Generated by OpenCVE AI on April 29, 2026 at 14:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Thu, 13 Nov 2025 11:30:00 +0000


Thu, 13 Nov 2025 10:45:00 +0000


Thu, 23 Oct 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Thu, 23 Oct 2025 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 22 Oct 2025 21:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Wed, 22 Oct 2025 14:45:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in designthemes Kriya kriya allows Object Injection.This issue affects Kriya: from n/a through <= 3.4.
Title WordPress Kriya theme <= 3.4 - PHP Object Injection Vulnerability
Weaknesses CWE-502
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T18:41:55.101Z

Reserved: 2025-09-25T15:34:23.206Z

Link: CVE-2025-60215

cve-icon Vulnrichment

Updated: 2025-10-22T20:31:55.573Z

cve-icon NVD

Status : Deferred

Published: 2025-10-22T15:15:58.720

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-60215

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T14:15:14Z

Weaknesses