CVE-2025-60214
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
2Description
Deserialization of Untrusted Data vulnerability in BoldThemes Goldenblatt goldenblatt allows Object Injection.This issue affects Goldenblatt: from n/a through < 1.3.0.
Analysis
PHP object injection in BoldThemes Goldenblatt WordPress theme versions prior to 1.3.0 enables unauthenticated remote attackers to execute arbitrary code through deserialization of untrusted data. The vulnerability scores 9.8 (Critical) with network-exploitable attack vector requiring no privileges or user interaction. EPSS indicates low probability (0.10%, 28th percentile) of active exploitation, and no public exploit or KEV listing identified at time of analysis, suggesting theoretical high severity but currently limited real-world exploitation activity.
Technical Context
This vulnerability stems from CWE-502 (Deserialization of Untrusted Data), a dangerous class of flaws where applications accept serialized objects from untrusted sources without validation. In PHP contexts, unserialize() functions on attacker-controlled data can trigger magic methods (__wakeup, __destruct) in existing classes, enabling code execution chains known as POP (Property-Oriented Programming) gadgets. WordPress themes and plugins frequently introduce object injection vulnerabilities through improper handling of cookies, POST parameters, or cached data. The Goldenblatt theme by BoldThemes contains such a deserialization weakness, allowing malicious actors to craft serialized PHP objects that, when processed by the theme's code, execute arbitrary logic on the server. The networkable attack vector (AV:N) indicates this can be exploited remotely over HTTP/HTTPS without requiring local system access.
Affected Products
BoldThemes Goldenblatt WordPress theme versions prior to 1.3.0 are confirmed vulnerable to PHP object injection. The vulnerability affects all installations running versions from initial release through 1.2.1, as documented in Patchstack's vulnerability database entry. Organizations should inventory WordPress sites using this commercial theme and verify installed versions against the fixed release. Vendor advisory and technical details available at https://patchstack.com/database/Wordpress/Theme/goldenblatt/vulnerability/wordpress-goldenblatt-theme-1-2-1-php-object-injection-vulnerability
Remediation
Immediately upgrade BoldThemes Goldenblatt theme to version 1.3.0 or later, which addresses the deserialization vulnerability according to Patchstack's disclosure. Site administrators should access WordPress admin dashboard, navigate to Appearance > Themes, and apply available updates. For sites unable to patch immediately, consider temporary mitigation by disabling the Goldenblatt theme and switching to a secure alternative until upgrade completion. No workaround exists for continued use of vulnerable versions due to the fundamental nature of unsafe deserialization in the codebase. Verify patch success by confirming theme version displays as 1.3.0 or higher post-update. Complete technical remediation guidance and vulnerability timeline available through Patchstack reference at https://patchstack.com/database/Wordpress/Theme/goldenblatt/vulnerability/wordpress-goldenblatt-theme-1-2-1-php-object-injection-vulnerability
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today