CVE-2025-49393
Published: 06 November 2025
Description
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Security Summary
CVE-2025-49393 is a Deserialization of Untrusted Data vulnerability (CWE-502) in the Fetch Designs Sign-up Sheets WordPress plugin (sign-up-sheets), enabling PHP Object Injection. The issue affects all versions of the plugin up to and including 2.3.2. It has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for high impact on confidentiality, integrity, and availability.
Unauthenticated remote attackers can exploit this vulnerability over the network with low complexity and no user interaction required. By supplying malicious serialized data, attackers can trigger object injection, potentially leading to arbitrary code execution, data manipulation, or server compromise, as reflected in the high-impact CVSS vector.
The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/sign-up-sheets/vulnerability/wordpress-sign-up-sheets-plugin-2-3-2-php-object-injection-vulnerability?_s_id=cve details the vulnerability in the WordPress Sign-up Sheets plugin version 2.3.2 and provides information on mitigation, likely including updating to a patched version where available.
Details
- CWE(s)
MITRE ATT&CK Enterprise Techniques
Why these techniques?
The vulnerability is an unauthenticated remote deserialization flaw in a public-facing WordPress plugin, directly enabling exploitation of a public-facing application for arbitrary code execution.