The Super Stage WP WordPress plugin through 1.0.1 unserializes user input via REQUEST, which could allow unauthenticated users to perform PHP Object Injection when a suitable gadget is present on the blog.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sat, 28 Feb 2026 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Super Stage WP WordPress plugin through 1.0.1 unserializes user input via REQUEST, which could allow unauthenticated users to perform PHP Object Injection when a suitable gadget is present on the blog. | |
| Title | Super Stage WP <= 1.0.1 - Unauthenticated PHP Object Injection | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2026-02-28T06:00:08.933Z
Reserved: 2026-01-28T15:00:06.802Z
Link: CVE-2026-1542
No data.
Status : Received
Published: 2026-02-28T06:16:02.080
Modified: 2026-02-28T06:16:02.080
Link: CVE-2026-1542
No data.
OpenCVE Enrichment
No data.
Weaknesses
No weakness.