- Description
- The PGS Core plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 5.8.0 via deserialization of untrusted input in the 'import_header' function. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
- Source
- security@wordfence.com
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- security@wordfence.com
- CWE-502
- Hype score
- Not currently trending
🚨 CVE-2025-0855 ⚠️🔴 CRITICAL (9.8) 🏢 Potenza Global Solutions - PGS Core 🏗️ * 🔗 https://t.co/NVLLZrYOIA 🔗 https://t.co/oUSn9UhFfb #CyberCron #VulnAlert #InfoSec https://t.co/1fj1guX6xk
@cybercronai
7 May 2025
28 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-0855 PHP Object Injection Vulnerability in WordPress PGS Core Plugin Before 5.8.0 https://t.co/iGfLwJftOe
@VulmonFeeds
7 May 2025
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-0855 The PGS Core plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 5.8.0 via deserialization of untrusted input in the 'impor… https://t.co/Ykv099PBqu
@CVEnew
6 May 2025
640 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes