CVE-2025-58642
BaseFortify
Publication date: 2025-09-03
Last updated on: 2026-04-23
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| enituretechnology | ltl_freight_quotes | * |
| enituretechnology | ltl_freight_quotes | 2.1.11 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-502 | The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a PHP Object Injection issue in the WordPress LTL Freight Quotes β Day & Ross Edition Plugin (up to version 2.1.11). It allows an attacker with administrator privileges to inject malicious PHP objects, potentially leading to code injection, SQL injection, path traversal, or denial of service attacks. Exploitation requires a suitable PHP Object Injection POP chain. The vulnerability is classified under OWASP Top 10 category A3: Injection. [1]
How can this vulnerability impact me? :
If exploited, this vulnerability can allow an attacker with admin access to execute arbitrary code, manipulate the database via SQL injection, access unauthorized files through path traversal, or cause denial of service, impacting the availability, integrity, and confidentiality of your WordPress site. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection of this vulnerability involves identifying if the WordPress LTL Freight Quotes β Day & Ross Edition Plugin version is up to 2.1.11. You can check the installed plugin version via WordPress admin dashboard or by running commands to inspect the plugin files. For example, use the following WP-CLI command to check the plugin version: `wp plugin get ltl-freight-quotes-day-ross-edition --field=version`. Additionally, monitoring for suspicious PHP Object Injection attempts or unusual administrator activity logs may help detect exploitation attempts. However, no specific detection commands for network or system scanning are provided in the resources. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include updating the LTL Freight Quotes β Day & Ross Edition Plugin to version 2.1.12 or later, which contains the fix for this vulnerability. If updating immediately is not possible, applying virtual patching (vPatching) offered by Patchstack can provide automatic protection against exploitation. Additionally, ensure that only trusted administrators have access to the WordPress site, as exploitation requires administrator privileges. [1]