CVE-2025-24779
BaseFortify
Publication date: 2025-07-16
Last updated on: 2026-04-23
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| nootheme | yogi | 2.9.0 |
| nootheme | yogi | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-502 | The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Deserialization of Untrusted Data issue in NooTheme Yogi, which allows Object Injection. It affects versions up to 2.9.0. This means that untrusted data can be deserialized in a way that allows an attacker to inject malicious objects, potentially leading to unauthorized actions or code execution.
How can this vulnerability impact me? :
The vulnerability can have a high impact, including complete compromise of confidentiality, integrity, and availability of the affected system. An attacker could execute arbitrary code, manipulate data, or disrupt services.