Impact
A flaw in the Solaris theme from ThemeREX deserializes data supplied by users without proper validation, permitting PHP object injection. The vulnerability can lead attackers to execute arbitrary code in the context of the WordPress site. The issue is especially dangerous because it does not require authentication and can be triggered through normal theme functionality.
Affected Systems
The Solaris theme is vulnerable in all releases from the earliest build through version 2.5, inclusive. Any WordPress installation that uses ThemeREX Solaris 2.5 or earlier is susceptible, regardless of the WordPress core version.
Risk and Exploitability
The vulnerability carries a CVSS score of 9.8, indicating critical severity. EPSS shows a probability of exploitation below 1%, and the flaw is not yet listed in the CISA KEV catalog. Attackers can exploit the flaw by sending a crafted serialized object to a page in the theme that invokes PHP's unserialize(), which is exposed via the web interface. No authentication is needed; the likely attack vector is remote, but this is inferred from the lack of authentication requirement.
OpenCVE Enrichment