Cyber Posture

CVE-2025-26967

High

Published: 03 March 2025

Published
03 March 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0036 57.8th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Security Summary

CVE-2025-26967 is a Deserialization of Untrusted Data vulnerability (CWE-502) in the Events Calendar for GeoDirectory WordPress plugin by Stiofan, which allows Object Injection. The issue affects the plugin in all versions from n/a through 2.3.14.

Attackers with low privileges (PR:L), such as authenticated users, can exploit this vulnerability over the network (AV:N) with low complexity (AC:L) and no user interaction (UI:N), without changing scope (S:U). Successful exploitation can result in high impacts to confidentiality, integrity, and availability (C:H/I:H/A:H), as reflected in the CVSS v3.1 base score of 8.8.

The Patchstack advisory provides further details on the vulnerability, including mitigation guidance, at https://patchstack.com/database/Wordpress/Plugin/events-for-geodirectory/vulnerability/wordpress-events-calendar-for-geodirectory-plugin-2-3-14-php-object-injection-vulnerability?_s_id=cve.

Details

CWE(s)
CWE-502

Affected Products

wpgeodirectory
events calendar*
≤ 2.3.15

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Deserialization/object injection vulnerability in public-facing WordPress plugin allows low-privilege authenticated users to achieve high C/I/A impact, directly mapping to exploitation of public-facing applications (T1190) and exploitation for privilege escalation (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References