CVE-2025-0724
📋 TL;DR
The ProfileGrid WordPress plugin is vulnerable to PHP object injection via deserialization of untrusted input, allowing authenticated attackers with Subscriber-level access to inject malicious PHP objects. This vulnerability only becomes dangerous when combined with another plugin or theme containing a POP chain, which could enable file deletion, data theft, or code execution. All WordPress sites using ProfileGrid versions up to 5.9.4.5 are affected.
💻 Affected Systems
- ProfileGrid – User Profiles, Groups and Communities WordPress plugin
📦 What is this software?
Profilegrid by Metagauss
⚠️ Risk & Real-World Impact
Worst Case
If combined with a suitable POP chain from another plugin/theme, attackers could achieve remote code execution, arbitrary file deletion, or sensitive data exfiltration, potentially compromising the entire WordPress site and server.
Likely Case
Limited impact due to the requirement for both authenticated access and a compatible POP chain from another component; most attacks would be unsuccessful unless the site has vulnerable plugins/themes installed.
If Mitigated
With proper access controls and no vulnerable POP chains present, the vulnerability has minimal impact as object injection alone cannot achieve code execution.
🎯 Exploit Status
Exploitation requires authenticated access (Subscriber or higher) and depends on finding compatible POP chains in other installed components.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version after 5.9.4.5
Vendor Advisory: https://plugins.trac.wordpress.org/browser/profilegrid-user-profiles-groups-and-communities
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find ProfileGrid plugin and click 'Update Now' if available. 4. Alternatively, download latest version from WordPress repository and manually update.
🔧 Temporary Workarounds
Disable ProfileGrid plugin
allTemporarily deactivate the vulnerable plugin until patched
Restrict user registration
allLimit new user registrations to prevent attackers from obtaining Subscriber accounts
🧯 If You Can't Patch
- Remove or disable any plugins/themes containing POP chains to eliminate attack vector
- Implement strict access controls and monitor for suspicious user activity
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → ProfileGrid version; if version is 5.9.4.5 or lower, you are vulnerable.
Check Version:
wp plugin list --name=profilegrid --field=version
Verify Fix Applied:
After updating, verify ProfileGrid version is higher than 5.9.4.5 in WordPress plugins list.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to ProfileGrid endpoints from Subscriber-level users
- PHP deserialization errors in web server logs
Network Indicators:
- HTTP requests containing serialized PHP objects in parameters
SIEM Query:
source="web_logs" AND (uri_path="*profilegrid*" AND (method="POST" AND user_role="subscriber"))