First published: Thu Apr 10 2025(Updated: )
Deserialization of Untrusted Data vulnerability in magepeopleteam WpEvently allows Object Injection. This issue affects WpEvently: from n/a through 4.3.5.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
WpEvently | <=4.3.5 | |
WordPress WpEvently | <=4.3.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-32145 is classified as a critical vulnerability due to its potential for remote code execution through object injection.
To fix CVE-2025-32145, upgrade WpEvently to version 4.3.6 or later to mitigate the deserialization of untrusted data vulnerability.
CVE-2025-32145 affects WpEvently from all versions up to and including 4.3.5.
The impact of CVE-2025-32145 on website security includes the potential for unauthorized access and manipulation of the website, leading to data breaches.
CVE-2025-32145 can be exploited by unauthenticated attackers who can send crafted serialized objects to vulnerable WpEvently installations.