CVE-2025-49072
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-06-06

Last updated on: 2026-04-23

Assigner: Patchstack

Description
Deserialization of Untrusted Data vulnerability in AncoraThemes Mr. Murphy mr-murphy allows Object Injection.This issue affects Mr. Murphy: from n/a through < 1.2.12.1.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-06
Last Modified
2026-04-23
Generated
2026-05-06
AI Q&A
2025-06-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-502 The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a PHP Object Injection issue in the AncoraThemes Mr. Murphy WordPress theme versions before 1.2.12.1. It allows unauthenticated attackers to inject malicious PHP objects, potentially leading to severe consequences such as remote code execution, SQL injection, path traversal, denial of service, and other attacks if a suitable Property Oriented Programming (POP) chain is available. [1]


How can this vulnerability impact me? :

The vulnerability can have critical impacts including remote code execution, which allows attackers to run arbitrary code on your server; SQL injection, which can compromise your database; path traversal, which can expose sensitive files; denial of service, which can disrupt your website availability; and other attacks. Because it is unauthenticated and has a high severity score (9.8), it poses a high risk of mass exploitation. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves monitoring for attack attempts that exploit PHP Object Injection in the Mr. Murphy WordPress theme versions prior to 1.2.12.1. Patchstack provides a virtual patch that blocks such attack attempts. Additionally, professional incident response services and server-side malware scanning are recommended to identify potential compromises. Specific commands are not provided in the resources. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include applying the Patchstack virtual patch (vPatch) to block attack attempts until the official update can be applied. Users should update the Mr. Murphy theme to version 1.2.12.1 or later to fully resolve the vulnerability. It is also recommended to perform server-side malware scanning and consider professional incident response if compromise is suspected. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart