CVE-2025-54742
BaseFortify
Publication date: 2025-08-28
Last updated on: 2026-04-23
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| magepeople | wp_evently | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-502 | The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Deserialization of Untrusted Data issue in the magepeopleteam WpEvently plugin, which allows Object Injection. It affects versions up to 4.4.8. This means that untrusted input data can be deserialized in a way that allows an attacker to inject malicious objects, potentially leading to unauthorized actions or code execution.
How can this vulnerability impact me? :
The vulnerability can have a high impact, including complete compromise of confidentiality, integrity, and availability of the affected system. An attacker could execute arbitrary code, modify data, or disrupt services due to the object injection via deserialization of untrusted data.