CVE-2026-23971
Deserialization Object Injection in WoodMart β€ 8.3.8 Enables Code Execution
Publication date: 2026-03-25
Last updated on: 2026-04-23
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| xtemos | woodmart | to 8.3.8 (inc) |
| xtemos | woodmart | 8.3.9 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-502 | The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-23971 is a high-priority PHP Object Injection vulnerability affecting the WordPress WoodMart Theme versions up to and including 8.3.8.
This vulnerability allows unauthenticated attackers to perform PHP Object Injection, which means attackers can inject malicious PHP objects into the application.
If a suitable Property Oriented Programming (POP) chain is available, this can lead to severe consequences such as remote code execution, SQL injection, path traversal, denial of service, and other attacks.
How can this vulnerability impact me? :
This vulnerability can have serious impacts including allowing attackers to execute arbitrary code remotely, which can compromise the entire server hosting the WordPress site.
Other potential impacts include SQL injection, which can lead to unauthorized access or modification of the database, path traversal attacks that can expose sensitive files, and denial of service attacks that can disrupt website availability.
Since the vulnerability requires no authentication to exploit, any attacker can attempt to exploit it without needing to log in.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability affects WordPress sites using the WoodMart Theme version 8.3.8 or earlier and allows unauthenticated PHP Object Injection. Detection typically involves checking the version of the WoodMart Theme installed on your WordPress site.
You can detect if your system is vulnerable by verifying the theme version via WordPress admin dashboard or by running commands on the server to check the theme version.
- Use WP-CLI to check the installed theme version: wp theme list --status=active
- Manually check the style.css file in the WoodMart theme directory (usually wp-content/themes/woodmart/) for the version number.
Additionally, monitoring web server logs for suspicious requests that may attempt PHP Object Injection payloads could help detect exploitation attempts, but no specific detection commands or signatures are provided.
What immediate steps should I take to mitigate this vulnerability?
The most effective immediate step is to update the WoodMart Theme to version 8.3.9 or later, which contains the fix for this vulnerability.
If updating immediately is not possible, it is recommended to apply mitigation rules provided by Patchstack or seek assistance from your hosting provider or web developers to block exploitation attempts.
Using automated mitigation solutions from Patchstack can help protect your website from attacks while you prepare to update.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows unauthenticated attackers to perform PHP Object Injection, potentially leading to remote code execution, SQL injection, path traversal, denial of service, and other attacks. Such security breaches can result in unauthorized access to sensitive data, which may impact compliance with standards and regulations like GDPR and HIPAA that require protection of personal and health information.
Failure to patch this vulnerability could lead to data breaches or service disruptions, which are reportable incidents under these regulations and could result in legal and financial penalties.
Therefore, organizations using affected versions of the WoodMart Theme should update to version 8.3.9 or later promptly to maintain compliance and reduce risk.