CVE-2025-60245

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to inject malicious objects through deserialization of untrusted data in the WP User Manager WordPress plugin. Successful exploitation could lead to remote code execution or complete site takeover. All WordPress sites running WP User Manager version 2.9.12 or earlier are affected.

💻 Affected Systems

Products:
  • WP User Manager WordPress plugin
Versions: All versions up to and including 2.9.12
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires plugin to be installed and active

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise leading to data theft, malware deployment, or use as attack platform

🟠

Likely Case

Website defacement, admin access takeover, or data exfiltration

🟢

If Mitigated

Limited impact if proper WAF rules block exploitation attempts

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available and relatively simple to execute

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.9.13 or later

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/wp-user-manager/vulnerability/wordpress-wp-user-manager-plugin-2-9-12-php-object-injection-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins > Installed Plugins
3. Find WP User Manager
4. Click 'Update Now' if available
5. If no update shows, download version 2.9.13+ from WordPress.org
6. Deactivate old version, upload new version, activate

🔧 Temporary Workarounds

Disable WP User Manager plugin

all

Temporarily deactivate the vulnerable plugin until patched

wp plugin deactivate wp-user-manager

WAF rule for object injection

all

Add web application firewall rule to block PHP object injection attempts

🧯 If You Can't Patch

  • Implement strict input validation on all user-controlled data
  • Restrict plugin access to authenticated users only

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > WP User Manager version

Check Version:

wp plugin get wp-user-manager --field=version

Verify Fix Applied:

Confirm plugin version is 2.9.13 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to wp-user-manager endpoints
  • PHP errors related to unserialize()

Network Indicators:

  • HTTP requests with serialized PHP objects in parameters

SIEM Query:

source="web_logs" AND (uri="*wp-user-manager*" AND (data="*O:*" OR data="*C:*"))

🔗 References

📤 Share & Export