CVE-2025-48101
BaseFortify
Publication date: 2025-09-09
Last updated on: 2026-04-28
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| webdevstudios | constant_contact_for_wordpress | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-502 | The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-48101 is a high-severity PHP Object Injection vulnerability in the Constant Contact for WordPress Plugin (up to version 4.1.1). It allows unauthenticated attackers to inject malicious PHP objects, which can lead to various attacks such as code injection, SQL injection, path traversal, and denial of service, depending on the presence of a suitable Property Oriented Programming (POP) chain. [1]
How can this vulnerability impact me? :
This vulnerability can have severe impacts including unauthorized code execution, database compromise through SQL injection, unauthorized file system access via path traversal, and denial of service attacks. These impacts can lead to website defacement, data theft, service disruption, and potentially full site compromise. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability may be difficult to detect using standard plugin-based malware scanners, as they can be unreliable for this issue. There are no specific detection commands provided. Users are advised to monitor for unusual PHP object injection attempts and consider professional incident response if compromise is suspected. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves applying Patchstack's virtual patch (vPatch) which blocks attacks targeting this vulnerability until an official fix is released. Users should implement this automated virtual patch proactively and seek professional incident response if their sites are compromised. [1]