CVE-2026-23549
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
2Tags
Description
Deserialization of Untrusted Data vulnerability in magepeopleteam WpEvently mage-eventpress allows Object Injection.This issue affects WpEvently: from n/a through <= 5.1.1.
Analysis
PHP Object Injection in WpEvently (mage-eventpress) WordPress plugin.
Sign in for full analysis, threat intelligence, and remediation guidance.
Remediation
Within 24 hours: Identify all WordPress instances running mage-eventpress and isolate affected systems from production networks if possible. Within 7 days: Implement Web Application Firewall (WAF) rules to block malicious serialized payloads, disable the WpEvently plugin if non-essential, and apply input validation controls. …
Sign in for detailed remediation steps.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today