First published: Thu Apr 17 2025(Updated: )
Deserialization of Untrusted Data vulnerability in Stylemix uListing allows Object Injection. This issue affects uListing: from n/a through 2.2.0.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
uListing | <=2.2.0 | |
uListing | <=2.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-32662 is classified as critical due to potential remote code execution through object injection.
To fix CVE-2025-32662, update the Stylemix uListing plugin to version 2.2.1 or later.
CVE-2025-32662 is caused by a deserialization of untrusted data vulnerability allowing Object Injection in uListing versions up to 2.2.0.
Users of Stylemix uListing and WordPress uListing versions up to and including 2.2.0 are affected by CVE-2025-32662.
Yes, CVE-2025-32662 can lead to further exploits such as remote code execution, making it critical to apply fixes promptly.