First published: Tue Apr 01 2025(Updated: )
Deserialization of Untrusted Data vulnerability in magepeopleteam WpTravelly allows Object Injection. This issue affects WpTravelly: from n/a through 1.8.7.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
WpTravelly | <=1.8.7 | |
WpTravelly Plugin | <=1.8.7 |
Update the WordPress WpTravelly plugin to the latest available version (at least 1.8.8).
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-30892 is considered a high severity vulnerability due to its potential for object injection and exploitation.
CVE-2025-30892 affects the WpTravelly plugin by magepeopleteam in versions up to and including 1.8.7.
To fix CVE-2025-30892, upgrade the WpTravelly plugin to the latest version provided by magepeopleteam.
Yes, CVE-2025-30892 can potentially allow remote code execution via object injection if exploited by an attacker.
Yes, a patch is available in the latest version of the WpTravelly plugin released after version 1.8.7.