CVE-2025-48101
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-09

Last updated on: 2026-04-28

Assigner: Patchstack

Description
Deserialization of Untrusted Data vulnerability in webdevstudios Constant Contact for WordPress allows Object Injection. This issue affects Constant Contact for WordPress: from n/a through 4.1.1.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-09
Last Modified
2026-04-28
Generated
2026-05-07
AI Q&A
2025-09-09
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
webdevstudios constant_contact_for_wordpress *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-502 The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-48101 is a high-severity PHP Object Injection vulnerability in the Constant Contact for WordPress Plugin (up to version 4.1.1). It allows unauthenticated attackers to inject malicious PHP objects, which can lead to various attacks such as code injection, SQL injection, path traversal, and denial of service, depending on the presence of a suitable Property Oriented Programming (POP) chain. [1]


How can this vulnerability impact me? :

This vulnerability can have severe impacts including unauthorized code execution, database compromise through SQL injection, unauthorized file system access via path traversal, and denial of service attacks. These impacts can lead to website defacement, data theft, service disruption, and potentially full site compromise. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability may be difficult to detect using standard plugin-based malware scanners, as they can be unreliable for this issue. There are no specific detection commands provided. Users are advised to monitor for unusual PHP object injection attempts and consider professional incident response if compromise is suspected. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation involves applying Patchstack's virtual patch (vPatch) which blocks attacks targeting this vulnerability until an official fix is released. Users should implement this automated virtual patch proactively and seek professional incident response if their sites are compromised. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart