Description
Deserialization of Untrusted Data vulnerability in Themeton Zuut allows Object Injection.This issue affects Zuut: from n/a through 1.4.2.
Published: 2026-03-19
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Apply Patch
AI Analysis

Impact

Deserialization of untrusted data in Themeton Zuut theme allows an attacker to perform PHP Object Injection, enabling execution of arbitrary code on the affected WordPress site. The vulnerability stems from improper validation of serialized input, a weakness identified as CWE‑502. If exploited, an attacker could gain full access to the web application, compromise data integrity, and potentially pivot to the underlying server.

Affected Systems

The defect affects the Zuut theme from the initial release (n/a) through version 1.4.2. All WordPress sites that have the Zuut theme installed and have not applied any mitigation beyond the default codebase are vulnerable.

Risk and Exploitability

The vulnerability carries a CVSS score of 9.8, indicating critical severity. The EPSS score is not available, but the KEV catalog lists it as not exploited in the wild as of the last update. The likely attack vector is remote, with a malicious actor sending crafted serialized data to the theme during a normal request; this inference is based on the nature of object injection in PHP applications.

Generated by OpenCVE AI on March 19, 2026 at 09:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the vendor’s website or the WordPress plugin directory for an updated Zuut theme release that removes the vulnerability.
  • If an updated version is available, upgrade the theme to that version immediately.
  • If no patch is available yet, consider disabling or deactivating the theme until a fix arrives to prevent potential exploitation.

Generated by OpenCVE AI on March 19, 2026 at 09:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Themeton
Themeton zuut
Wordpress
Wordpress wordpress
Vendors & Products Themeton
Themeton zuut
Wordpress
Wordpress wordpress

Thu, 19 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 19 Mar 2026 08:30:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in Themeton Zuut allows Object Injection.This issue affects Zuut: from n/a through 1.4.2.
Title WordPress Zuut theme <= 1.4.2 - PHP Object Injection vulnerability
Weaknesses CWE-502
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Themeton Zuut
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-03-19T13:42:27.406Z

Reserved: 2025-09-25T15:34:39.168Z

Link: CVE-2025-60233

cve-icon Vulnrichment

Updated: 2026-03-19T13:42:20.069Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-19T09:16:16.050

Modified: 2026-03-19T13:25:00.570

Link: CVE-2025-60233

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T14:15:30Z

Weaknesses