CVE-2025-58642
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-03

Last updated on: 2026-04-23

Assigner: Patchstack

Description
Deserialization of Untrusted Data vulnerability in enituretechnology LTL Freight Quotes – Day & Ross Edition ltl-freight-quotes-day-ross-edition allows Object Injection.This issue affects LTL Freight Quotes – Day & Ross Edition: from n/a through <= 2.1.11.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-03
Last Modified
2026-04-23
Generated
2026-05-07
AI Q&A
2025-09-03
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
enituretechnology ltl_freight_quotes *
enituretechnology ltl_freight_quotes 2.1.11
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-502 The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a PHP Object Injection issue in the WordPress LTL Freight Quotes – Day & Ross Edition Plugin (up to version 2.1.11). It allows an attacker with administrator privileges to inject malicious PHP objects, potentially leading to code injection, SQL injection, path traversal, or denial of service attacks. Exploitation requires a suitable PHP Object Injection POP chain. The vulnerability is classified under OWASP Top 10 category A3: Injection. [1]


How can this vulnerability impact me? :

If exploited, this vulnerability can allow an attacker with admin access to execute arbitrary code, manipulate the database via SQL injection, access unauthorized files through path traversal, or cause denial of service, impacting the availability, integrity, and confidentiality of your WordPress site. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves identifying if the WordPress LTL Freight Quotes – Day & Ross Edition Plugin version is up to 2.1.11. You can check the installed plugin version via WordPress admin dashboard or by running commands to inspect the plugin files. For example, use the following WP-CLI command to check the plugin version: `wp plugin get ltl-freight-quotes-day-ross-edition --field=version`. Additionally, monitoring for suspicious PHP Object Injection attempts or unusual administrator activity logs may help detect exploitation attempts. However, no specific detection commands for network or system scanning are provided in the resources. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include updating the LTL Freight Quotes – Day & Ross Edition Plugin to version 2.1.12 or later, which contains the fix for this vulnerability. If updating immediately is not possible, applying virtual patching (vPatching) offered by Patchstack can provide automatic protection against exploitation. Additionally, ensure that only trusted administrators have access to the WordPress site, as exploitation requires administrator privileges. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart