Description
Deserialization of Untrusted Data vulnerability in MetaSlider Responsive Slider by MetaSlider allows Object Injection.This issue affects Responsive Slider by MetaSlider: from n/a through 3.106.0.
Published: 2026-04-21
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Object injection potentially enabling arbitrary code execution
Action: Patch Now
AI Analysis

Impact

The vulnerability is a deserialization of untrusted data that permits PHP object injection, classified as CWE-502. It exists in MetaSlider Responsive Slider by MetaSlider plugin through version 3.106.0. Based on the description, it is inferred that an attacker could craft a serialized payload that, when deserialized by the plugin, creates arbitrary PHP objects and could trigger remote code execution or other malicious actions. The plugin does not perform input validation on the data it deserializes, allowing the injection of crafted payloads and potentially compromising site integrity and confidentiality.

Affected Systems

The product affected is the WordPress plugin MetaSlider Responsive Slider by MetaSlider. All releases from the earliest version up to 3.106.0 are vulnerable. Any WordPress site that has not upgraded to at least 3.107.0 remains at risk.

Risk and Exploitability

The CVSS score of 7.2 indicates high severity, while the EPSS score of below 1% suggests that exploitation is currently rare and it is not listed in the CISA KEV catalog. The likely attack vector is through the plugin’s functionality that accepts serialized data from external requests; this inference is drawn from the nature of the flaw. No public exploit is documented, but the potential for arbitrary code execution exists if an attacker can supply crafted input. The overall risk is high for affected installations, though the probability of exploitation is low at present.

Generated by OpenCVE AI on April 22, 2026 at 03:23 UTC.

Remediation

Vendor Solution

Update the WordPress Responsive Slider by MetaSlider Plugin to the latest available version (at least 3.107.0).


OpenCVE Recommended Actions

  • Update the Responsive Slider by MetaSlider plugin to at least version 3.107.0 to apply the vendor fix.
  • If an immediate update is not possible, temporarily deactivate or delete the plugin to eliminate the attack surface until the patch can be applied.
  • As a short‑term measure, restrict or monitor any endpoints that allow serialized input, and ensure WordPress is configured to disallow unserialization of data from untrusted sources.

Generated by OpenCVE AI on April 22, 2026 at 03:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Metaslider
Metaslider responsive Slider By Metaslider
Wordpress
Wordpress wordpress
Vendors & Products Metaslider
Metaslider responsive Slider By Metaslider
Wordpress
Wordpress wordpress

Tue, 21 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in MetaSlider Responsive Slider by MetaSlider allows Object Injection.This issue affects Responsive Slider by MetaSlider: from n/a through 3.106.0.
Title WordPress Responsive Slider by MetaSlider plugin <= 3.106.0 - PHP Object Injection vulnerability
Weaknesses CWE-502
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Metaslider Responsive Slider By Metaslider
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-21T09:35:29.246Z

Reserved: 2026-04-07T10:41:57.169Z

Link: CVE-2026-39467

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2026-04-21T10:16:29.280

Modified: 2026-04-22T20:22:50.570

Link: CVE-2026-39467

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T11:46:39Z

Weaknesses