Cyber Posture

CVE-2025-58998

Critical

Published: 06 November 2025

Published
06 November 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0010 27.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-58998 is a Deserialization of Untrusted Data vulnerability (CWE-502) in the s2Member WordPress plugin by Cristián Lávaque. The flaw allows Object Injection and affects s2Member versions from n/a through <= 250701.

With a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), the vulnerability is exploitable over the network by unauthenticated attackers requiring low complexity and no user interaction. Attackers can achieve high impacts on confidentiality, integrity, and availability through object injection.

The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/s2member/vulnerability/wordpress-s2member-plugin-250701-php-object-injection-vulnerability?_s_id=cve details the issue in the WordPress s2Member plugin version 250701. Practitioners should review this reference for recommended mitigations, such as applying available patches.

Details

CWE(s)
CWE-502

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is a deserialization flaw (CWE-502) in a WordPress plugin, enabling unauthenticated remote object injection with high-impact RCE on a public-facing web application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References