CVE-2025-0724

8.8 HIGH

📋 TL;DR

The ProfileGrid WordPress plugin is vulnerable to PHP object injection via deserialization of untrusted input, allowing authenticated attackers with Subscriber-level access to inject malicious PHP objects. This vulnerability only becomes dangerous when combined with another plugin or theme containing a POP chain, which could enable file deletion, data theft, or code execution. All WordPress sites using ProfileGrid versions up to 5.9.4.5 are affected.

💻 Affected Systems

Products:
  • ProfileGrid – User Profiles, Groups and Communities WordPress plugin
Versions: All versions up to and including 5.9.4.5
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with ProfileGrid plugin; impact depends on presence of POP chains in other installed plugins/themes.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

If combined with a suitable POP chain from another plugin/theme, attackers could achieve remote code execution, arbitrary file deletion, or sensitive data exfiltration, potentially compromising the entire WordPress site and server.

🟠

Likely Case

Limited impact due to the requirement for both authenticated access and a compatible POP chain from another component; most attacks would be unsuccessful unless the site has vulnerable plugins/themes installed.

🟢

If Mitigated

With proper access controls and no vulnerable POP chains present, the vulnerability has minimal impact as object injection alone cannot achieve code execution.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access (Subscriber or higher) and depends on finding compatible POP chains in other installed components.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 5.9.4.5

Vendor Advisory: https://plugins.trac.wordpress.org/browser/profilegrid-user-profiles-groups-and-communities

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find ProfileGrid plugin and click 'Update Now' if available. 4. Alternatively, download latest version from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable ProfileGrid plugin

all

Temporarily deactivate the vulnerable plugin until patched

Restrict user registration

all

Limit new user registrations to prevent attackers from obtaining Subscriber accounts

🧯 If You Can't Patch

  • Remove or disable any plugins/themes containing POP chains to eliminate attack vector
  • Implement strict access controls and monitor for suspicious user activity

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → ProfileGrid version; if version is 5.9.4.5 or lower, you are vulnerable.

Check Version:

wp plugin list --name=profilegrid --field=version

Verify Fix Applied:

After updating, verify ProfileGrid version is higher than 5.9.4.5 in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to ProfileGrid endpoints from Subscriber-level users
  • PHP deserialization errors in web server logs

Network Indicators:

  • HTTP requests containing serialized PHP objects in parameters

SIEM Query:

source="web_logs" AND (uri_path="*profilegrid*" AND (method="POST" AND user_role="subscriber"))

🔗 References

📤 Share & Export