CVE-2026-24954

magepeopleteam · WpEvently (mage-eventpress)

The WpEvently (mage-eventpress) WordPress plugin is vulnerable to PHP Object Injection via deserialization of untrusted data, potentially leading to remote code execution.

Executive summary

The magepeopleteam WpEvently plugin for WordPress is vulnerable to a critical deserialization flaw that could allow an attacker to execute arbitrary code.

Vulnerability

This vulnerability is a Deserialization of Untrusted Data issue within the WpEvently plugin. By providing specially crafted input to a vulnerable parameter, an attacker can trigger PHP Object Injection, potentially leading to arbitrary code execution or unauthorized file manipulation on the host server.

Business impact

A successful exploit could result in a complete takeover of the WordPress site, allowing attackers to steal user data, deface the website, or use the server as a jumping-off point for further attacks. The CVSS score of 8.8 reflects the high severity and the relative ease with which an attacker could cause significant operational damage.

Remediation

Immediate Action: Update the WpEvently (mage-eventpress) plugin to the latest version immediately to patch the insecure deserialization point.

Proactive Monitoring: Scan WordPress logs for suspicious PHP error messages or unusual activity in the plugin's directories that might indicate exploitation attempts.

Compensating Controls: Implement a Web Application Firewall (WAF) with rules specifically designed to block PHP Object Injection and common WordPress exploit patterns.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Due to the high CVSS score of 8.8 and the risk of site takeover, this vulnerability must be addressed immediately. Administrators should prioritize updating the WpEvently plugin and consider a broader audit of their WordPress environment for similar deserialization vulnerabilities.