Description
Deserialization of Untrusted Data vulnerability in ThemeREX Pizza House pizzahouse allows Object Injection.This issue affects Pizza House: from n/a through <= 1.4.0.
Published: 2026-03-05
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch
AI Analysis

Impact

The flaw is a PHP Object Injection that occurs when the theme deserializes data supplied by an attacker. Because the data is not trusted, it can cause arbitrary objects to be instantiated and subsequently executed, potentially allowing an attacker to run arbitrary code. The vulnerability is classified as CWE-502, reflecting unsafe handling of serialized data, and is rated with a CVSS score of 9.8, indicating a critical risk.

Affected Systems

All installations of the ThemeREX Pizza House theme version 1.4.0 and earlier are affected. The vulnerability applies to the ThemeREX Pizza House theme, which is distributed under the ThemeREX vendor. The issue is relevant to any WordPress site that has chosen this theme, regardless of its versioning prior to 1.4.0.

Risk and Exploitability

The CVSS score of 9.8 sharply increases the severity, while the EPSS score of less than 1% suggests the probability of exploitation remains low but non‑zero. The vulnerability is not in the CISA KEV catalog, implying no known widespread exploitation at this time. Based on the description, it is inferred that an attacker can exploit the flaw by sending a malicious serialized string to the theme’s processing routine, which can result in arbitrary code execution. The likely attack vector is remote, requiring the attacker to supply the vulnerable serialized data to the theme. The consequences of a successful exploit include full code execution privileges on the affected WordPress site.

Generated by OpenCVE AI on April 16, 2026 at 04:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade ThemeREX Pizza House theme to the latest available version, if a newer release exists.
  • If an upgrade is not immediately possible, deactivate the theme or replace it with a secure alternative to prevent untrusted serialized data from being processed.
  • As a temporary measure, restrict or block all endpoints that allow the theme to receive serialized input, such as its admin panels, and configure WordPress to sanitize or reject such data.

Generated by OpenCVE AI on April 16, 2026 at 04:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Themerex
Themerex pizza House
Wordpress
Wordpress wordpress
Vendors & Products Themerex
Themerex pizza House
Wordpress
Wordpress wordpress

Thu, 05 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in ThemeREX Pizza House pizzahouse allows Object Injection.This issue affects Pizza House: from n/a through <= 1.4.0.
Title WordPress Pizza House theme <= 1.4.0 - PHP Object Injection vulnerability
Weaknesses CWE-502
References

Subscriptions

Themerex Pizza House
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:15:37.690Z

Reserved: 2026-02-25T12:13:47.059Z

Link: CVE-2026-28074

cve-icon Vulnrichment

Updated: 2026-03-05T20:37:48.284Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-05T06:16:41.307

Modified: 2026-03-05T21:16:21.170

Link: CVE-2026-28074

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T05:00:09Z

Weaknesses