Description
Deserialization of Untrusted Data vulnerability in ThemeREX Equestrian Centre equestrian-centre allows Object Injection.This issue affects Equestrian Centre: from n/a through <= 1.5.
Published: 2026-03-05
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a PHP Object Injection flaw caused by the deserialization of untrusted data within the WordPress Equestrian Centre theme. An attacker can craft malicious serialized input that, when deserialized by the theme, may instantiate arbitrary PHP objects and execute code, leading to full control over the affected web server.

Affected Systems

This issue affects all installations of the ThemeREX Equestrian Centre theme from its earliest version up through 1.5 inclusive. No specific patched release version is listed in the advisory, but the vendor recommends upgrading beyond 1.5 to eliminate the vulnerability.

Risk and Exploitability

The CVSS score of 9.8 indicates critical severity, while the EPSS score of less than 1% points to a very low current exploitation probability, and the vulnerability is not listed in CISA’s KEV catalog. The attack vector is inferred to be remote, web‑based, likely requiring no authentication because the deserialization process occurs on user‑supplied data. If exploited, the impact is complete compromise of the web application and possibly the underlying server, providing attackers with system‑wide access.

Generated by OpenCVE AI on April 16, 2026 at 05:19 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the ThemeREX Equestrian Centre theme to the latest released version (1.6 or newer) that fixes the deserialization problem.
  • If an upgrade is not immediately possible, remove the theme or disable any code paths that call PHP’s unserialize on user input, or replace them with a safe deserialization routine that strictly limits allowed classes.
  • As a temporary hardening measure, configure PHP to restrict execution of arbitrary code (e.g., by setting `disable_functions`, tightening file permissions, and monitoring logs for abnormal serialized inputs).

Generated by OpenCVE AI on April 16, 2026 at 05:19 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 09 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Themerex
Themerex equestrian Centre
Wordpress
Wordpress wordpress
Vendors & Products Themerex
Themerex equestrian Centre
Wordpress
Wordpress wordpress

Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in ThemeREX Equestrian Centre equestrian-centre allows Object Injection.This issue affects Equestrian Centre: from n/a through <= 1.5.
Title WordPress Equestrian Centre theme <= 1.5 - PHP Object Injection vulnerability
Weaknesses CWE-502
References

Subscriptions

Themerex Equestrian Centre
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:13:58.860Z

Reserved: 2026-01-07T13:44:06.689Z

Link: CVE-2026-22474

cve-icon Vulnrichment

Updated: 2026-03-09T19:56:44.678Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-05T06:16:21.040

Modified: 2026-03-09T20:16:06.163

Link: CVE-2026-22474

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T05:30:25Z

Weaknesses