First published: Thu Apr 03 2025(Updated: )
Deserialization of Untrusted Data vulnerability in PickPlugins Testimonial Slider allows Object Injection. This issue affects Testimonial Slider: from n/a through 2.0.13.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
PickPlugins Testimonial Slider | <=2.0.13 | |
WordPress Testimonial Slider | <=2.0.13 |
Update the WordPress Testimonial Slider plugin to the latest available version (at least 2.0.14).
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-30889 is considered to be medium due to its potential for object injection attacks.
To fix CVE-2025-30889, you should update the PickPlugins Testimonial Slider plugin to version 2.0.14 or later.
CVE-2025-30889 could allow an attacker to exploit untrusted data deserialization, leading to possible remote code execution.
CVE-2025-30889 affects all versions of PickPlugins Testimonial Slider from the earliest release up to and including version 2.0.13.
Yes, CVE-2025-30889 is specifically related to the PickPlugins Testimonial Slider used in WordPress.