Cyber Posture

CVE-2025-49393

Critical

Published: 06 November 2025

Published
06 November 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0010 27.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-49393 is a Deserialization of Untrusted Data vulnerability (CWE-502) in the Fetch Designs Sign-up Sheets WordPress plugin (sign-up-sheets), enabling PHP Object Injection. The issue affects all versions of the plugin up to and including 2.3.2. It has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for high impact on confidentiality, integrity, and availability.

Unauthenticated remote attackers can exploit this vulnerability over the network with low complexity and no user interaction required. By supplying malicious serialized data, attackers can trigger object injection, potentially leading to arbitrary code execution, data manipulation, or server compromise, as reflected in the high-impact CVSS vector.

The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/sign-up-sheets/vulnerability/wordpress-sign-up-sheets-plugin-2-3-2-php-object-injection-vulnerability?_s_id=cve details the vulnerability in the WordPress Sign-up Sheets plugin version 2.3.2 and provides information on mitigation, likely including updating to a patched version where available.

Details

CWE(s)
CWE-502

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is an unauthenticated remote deserialization flaw in a public-facing WordPress plugin, directly enabling exploitation of a public-facing application for arbitrary code execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References