CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Description
Deserialization of Untrusted Data vulnerability in themeton PIMP - Creative MultiPurpose allows Object Injection. This issue affects PIMP - Creative MultiPurpose: from n/a through 1.7.
Analysis
Critical deserialization of untrusted data vulnerability in themeton PIMP (Creative MultiPurpose) plugin affecting versions through 1.7, allowing unauthenticated remote attackers to inject arbitrary objects and achieve complete system compromise (confidentiality, integrity, and availability impact). The CVSS 9.8 score reflects the network-accessible, authentication-free attack vector with high impact across all three security dimensions. Exploitation requires no user interaction and can be performed by any unauthenticated network attacker, making this a severe priority if the KEV catalog confirms active exploitation or POC availability.
Technical Context
This vulnerability exploits unsafe deserialization patterns (CWE-502) in the themeton PIMP plugin, likely a WordPress or similar CMS extension. Unsafe deserialization occurs when the application deserializes untrusted data without proper validation, allowing attackers to instantiate arbitrary PHP objects with crafted property values. In WordPress/PHP contexts, gadget chains (sequences of existing classes with magic methods like __wakeup, __destruct, or __toString) can be chained together to achieve remote code execution. The vulnerability affects PIMP versions n/a through 1.7, suggesting all releases up to and including version 1.7 are vulnerable. Without vendor CPE strings provided, the affected product is identified as themeton/pimp (WordPress plugin family), likely with CPE structure vendor:themeton:pimp:<=1.7.
Affected Products
PIMP - Creative MultiPurpose (1.7 and earlier (all versions through 1.7))
Remediation
Vendor Patch: Upgrade themeton PIMP to version 1.8 or later (assuming patched version exists). Check themeton official repository or WordPress.org plugin directory for the latest release.; priority: Critical - deploy immediately Workaround (if patch unavailable): Disable or deactivate the PIMP plugin until a patch is released. This eliminates the attack surface entirely.; priority: High Detection & Monitoring: Monitor HTTP requests for serialized PHP objects (PHP serialize() format begins with 'O:' or 's:'), implement WAF rules to block POST/GET parameters containing serialized data to the plugin endpoints.; priority: Medium - supplement primary remediation Network Segmentation: If immediate patching is impossible, restrict network access to the WordPress instance via IP allowlisting or WAF rules to trusted sources only.; priority: Medium
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17499