Deserialization of Untrusted Data vulnerability in magepeopleteam WpEvently mage-eventpress allows Object Injection.This issue affects WpEvently: from n/a through <= 5.0.8.

Project Subscriptions

Vendors Products
Wordpress Subscribe
Wordpress Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 04 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Tue, 03 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 03 Feb 2026 14:30:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in magepeopleteam WpEvently mage-eventpress allows Object Injection.This issue affects WpEvently: from n/a through <= 5.0.8.
Title WordPress WpEvently plugin <= 5.0.8 - Deserialization of untrusted data vulnerability
Weaknesses CWE-502
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-02-03T18:32:41.235Z

Reserved: 2026-01-28T09:50:29.518Z

Link: CVE-2026-24954

cve-icon Vulnrichment

Updated: 2026-02-03T18:31:56.791Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-03T15:16:16.280

Modified: 2026-02-03T19:16:22.540

Link: CVE-2026-24954

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-04T12:14:20Z

Weaknesses