Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-54001 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: PHP Object Injection via untrusted data deserialization. πŸ’₯ **Consequences**: Attackers can inject malicious objects, leading to full system compromise, data theft, or service disruption.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-502 (Deserialization of Untrusted Data). The plugin fails to validate/sanitize data before passing it to PHP's `unserialize()` function.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: WordPress Plugin **Classter** by ThemeREX. πŸ“‰ **Versions**: 2.5 and earlier. 🌐 **Platform**: WordPress sites running this specific theme/plugin.

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Capabilities**: Remote Code Execution (RCE), arbitrary file manipulation, database access. πŸ“Š **Impact**: High (CVSS H). Full control over the server environment and sensitive data exposure.

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Threshold**: **LOW**. CVSS indicates: Network Accessible (AV:N), Low Complexity (AC:L), No Privileges Required (PR:N), No User Interaction (UI:N). Easy to exploit remotely.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“œ **Exploit Status**: No public PoC/Exploit listed in the provided data. However, the vulnerability type is well-known, making custom exploits likely available in the wild.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for WordPress sites running **Classter** theme/plugin version ≀ 2.5. Look for endpoints triggering PHP object deserialization or unusual HTTP requests containing serialized payloads.

Q8Is it fixed officially? (Patch/Mitigation)

πŸ› οΈ **Fix**: Update Classter plugin/theme to the latest version released by ThemeREX. πŸ“ **Reference**: Check Patchstack database for official patch details.

Q9What if no patch? (Workaround)

🚧 **Workaround**: If unpatched, restrict web server access to plugin directories, disable PHP execution in upload folders, and implement strict WAF rules to block serialized object payloads.

Q10Is it urgent? (Priority Suggestion)

⚑ **Priority**: **CRITICAL**. High CVSS score (likely 9.8+), no auth required, and direct path to RCE. Immediate patching is strongly recommended to prevent takeover.