CVE-2026-22501
Deserialization Vulnerability in Mounthood Plugin Enables Object Injection
Publication date: 2026-03-05
Last updated on: 2026-03-09
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| axiomthemes | mounthood | to 1.3.2 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-502 | The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-22501 is a high-priority PHP Object Injection vulnerability affecting the WordPress Mounthood Theme versions up to and including 1.3.2.
This vulnerability allows unauthenticated attackers to perform PHP Object Injection, which means attackers can inject malicious objects into the application.
If a suitable Property Oriented Programming (POP) chain is available, this can lead to severe consequences such as remote code execution, SQL injection, path traversal, denial of service, and other attacks.
How can this vulnerability impact me? :
This vulnerability can have critical impacts including allowing attackers to execute remote code on your server, perform SQL injection attacks, traverse file paths to access sensitive files, cause denial of service, and potentially other harmful actions.
Because the vulnerability can be exploited by unauthenticated attackers, it poses a significant risk to the security and availability of your website.
No official patch is available yet, so users are advised to apply mitigation rules provided by Patchstack to block exploitation attempts.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
Users are strongly advised to apply the mitigation rule issued by Patchstack immediately to block exploitation attempts until an official patch becomes available.
Since no official patch has been released by the theme developers as of the publication date, applying this mitigation is the best immediate step to protect your WordPress websites using the Mounthood theme.