CVE-2026-32513
Received Received - Intake
Deserialization Object Injection in JS Archive List

Publication date: 2026-03-25

Last updated on: 2026-03-25

Assigner: Patchstack

Description
Deserialization of Untrusted Data vulnerability in Miguel Useche JS Archive List jquery-archive-list-widget allows Object Injection.This issue affects JS Archive List: from n/a through <= 6.1.7.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-25
Last Modified
2026-03-25
Generated
2026-05-07
AI Q&A
2026-03-25
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
miguel_useche jquery-archive-list-widget to 6.1.7 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-502 The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-32513 is a PHP Object Injection vulnerability in the Miguel Useche JS Archive List jquery-archive-list-widget plugin, affecting versions up to and including 6.1.7.

This vulnerability allows attackers to inject malicious PHP objects through deserialization of untrusted data, potentially enabling code injection, SQL injection, path traversal, denial of service, and other attacks if a suitable Property Oriented Programming (POP) chain is available.

It is classified as a medium priority vulnerability with a CVSS severity score of 8.8 and falls under the OWASP Top 10 category A3: Injection.


How can this vulnerability impact me? :

Exploitation of this vulnerability can lead to severe impacts including remote code execution, unauthorized database access via SQL injection, file system access through path traversal, denial of service, and other malicious activities.

Because the vulnerability can be exploited by attackers with contributor or developer privileges, it poses a significant risk to websites using the affected plugin, potentially compromising the integrity, confidentiality, and availability of the affected systems.

The vulnerability is likely to be targeted in mass-exploit campaigns affecting thousands of websites regardless of their traffic or popularity.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability affects the WordPress JS Archive List Plugin versions up to and including 6.1.7 and involves PHP Object Injection. Detection can focus on identifying the presence of the vulnerable plugin version on your system.

You can detect the vulnerable plugin version by checking the installed plugin version in your WordPress environment.

  • Use WP-CLI to list installed plugins and their versions: wp plugin list
  • Look specifically for 'jquery-archive-list-widget' and verify if its version is less than or equal to 6.1.7.

Additionally, network detection can involve monitoring for attack patterns targeting this vulnerability using Patchstack's automatic mitigation rules or IDS/IPS signatures if available.


What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to update the JS Archive List Plugin to version 6.2.0 or later, where the vulnerability has been patched.

Until you can update, you can apply Patchstack's automatic mitigation rule to block attacks targeting this vulnerability.

You may also enable auto-update features for the vulnerable plugin to ensure rapid protection.

If you are not able to update immediately, seek assistance from your hosting provider or developers to prevent exploitation.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The CVE-2026-32513 vulnerability allows PHP Object Injection, which can lead to severe impacts such as code injection, SQL injection, path traversal, and denial of service. These impacts can compromise the confidentiality, integrity, and availability of data.

Such compromises can affect compliance with common standards and regulations like GDPR and HIPAA, which require protection of sensitive data and maintaining system integrity and availability.

Therefore, if exploited, this vulnerability could lead to violations of these regulations due to unauthorized data access or disruption of services.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart