Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-48289 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Untrusted data deserialization in Kids Planet plugin leads to **PHP Object Injection**.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-502** (Deserialization of Untrusted Data).…

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Affected**: **WordPress Plugin: Kids Planet**. πŸ“¦ **Version**: **2.2.14 and earlier**. Vendor: **AncoraThemes**. If you are running an older version, you are at risk.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Capabilities**: High impact! CVSS Score indicates **Critical** severity. Attackers can achieve **Full System Compromise**.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Exploitation Threshold**: **LOW**. CVSS Vector `PR:N/UI:N` means **No Privileges** and **No User Interaction** required. It is a network-accessible vulnerability (AV:N) with Low Complexity (AC:L).…

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“œ **Public Exploit**: Currently, the `pocs` field is empty in the data. However, given the nature of Object Injection, PoCs are likely emerging. Check Patchstack references for community proof-of-concepts.…

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: 1. Check WordPress Admin > Plugins. 2. Look for **Kids Planet** by AncoraThemes. 3. Verify version number. If it is **≀ 2.2.14**, you are vulnerable.…

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Official Fix**: The vendor (AncoraThemes) is expected to release a patched version. The CVE was published on **2025-05-23**. Check the vendor's official site or WordPress repository for an update > 2.2.14.

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: 1. **Deactivate** the Kids Planet plugin immediately if not essential. 2. **Delete** the plugin if unused. 3.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. With CVSS High/Critical impact and no auth required, this is a **Priority 1** issue. Patch or disable immediately to prevent potential server takeover. Do not wait!