Description
Deserialization of Untrusted Data vulnerability in ThemeGoods Grand Restaurant grandrestaurant allows Object Injection.This issue affects Grand Restaurant: from n/a through <= 7.0.10.
Published: 2026-02-19
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Apply Patch
AI Analysis

Impact

The vulnerability is an instance of insecure deserialization (CWE-502) in the Grand Restaurant WordPress theme. Untrusted serialized data can be supplied to the theme, allowing an attacker to instantiate arbitrary objects and execute code, which leads directly to remote code execution. This flaw enables an attacker to tamper with integrity and confidentiality of the site, potentially taking full control over the affected WordPress installation. The description does not specify any special authorization requirements, implying that the attack may be carried out via standard web requests that reach the theme’s processing endpoints. The inference that the attack vector is remote via web requests is drawn from the lack of explicit authorization in the description.

Affected Systems

The affected system is the WordPress Grand Restaurant theme, produced by ThemeGoods. Versions from the first release through 7.0.10 are susceptible. The problem resides in the theme’s handling of serialized data rather than in WordPress core or other plugins.

Risk and Exploitability

With a CVSS score of 9.8 the vulnerability is considered critical. The EPSS score is less than 1%, reflecting a low probability of exploitation at the time of analysis, yet the lack of known exploitation (not listed in KEV) does not diminish the severity. The likely attack vector is remote via the WordPress web interface wherever the theme accepts serialized input; no additional authentication or privilege escalation steps are documented, suggesting that any authenticated user or possibly even unauthenticated users could be leveraged depending on how the theme processes incoming data. This inference is based solely on the absence of explicit authorization in the description.

Generated by OpenCVE AI on April 16, 2026 at 17:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Grand Restaurant theme to any non‑vulnerable released version by ThemeGoods (any version newer than 7.0.10).
  • If an immediate upgrade cannot be performed, disable or remove the Grand Restaurant theme and switch to a secure alternative until a patch is available.
  • Review and update all other WordPress components for similar deserialization flaws, and ensure that any functions accepting user input are hardened or removed.

Generated by OpenCVE AI on April 16, 2026 at 17:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Feb 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Themegoods
Themegoods grand Restaurant
Wordpress
Wordpress wordpress
Vendors & Products Themegoods
Themegoods grand Restaurant
Wordpress
Wordpress wordpress

Fri, 20 Feb 2026 01:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 19 Feb 2026 22:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Thu, 19 Feb 2026 08:45:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in ThemeGoods Grand Restaurant grandrestaurant allows Object Injection.This issue affects Grand Restaurant: from n/a through <= 7.0.10.
Title WordPress Grand Restaurant theme <= 7.0.10 - PHP Object Injection vulnerability
Weaknesses CWE-502
References

Subscriptions

Themegoods Grand Restaurant
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:46.771Z

Reserved: 2026-01-14T08:36:07.868Z

Link: CVE-2026-23542

cve-icon Vulnrichment

Updated: 2026-02-19T21:34:11.960Z

cve-icon NVD

Status : Deferred

Published: 2026-02-19T09:16:12.050

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-23542

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T17:15:17Z

Weaknesses