CVE-2025-54053
BaseFortify
Publication date: 2025-08-20
Last updated on: 2026-04-23
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| adrian_tobey | groundhogg | 4.2.2 |
| adrian_tobey | groundhogg | * |
| adrian_tobey | groundhogg | 4.2.2.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-502 | The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Deserialization of Untrusted Data issue in Adrian Tobey Groundhogg that allows Object Injection. It affects versions up to 4.2.2. Deserialization vulnerabilities occur when untrusted data is used to reconstruct objects, potentially allowing attackers to inject malicious objects and execute unintended actions.
How can this vulnerability impact me? :
This vulnerability can lead to high impact on confidentiality, integrity, and availability of the affected system, as indicated by the CVSS score. An attacker with high privileges could exploit this to inject malicious objects, potentially leading to unauthorized data access, data modification, or denial of service.