Deserialization Vulnerability in WpEvently by MagePeople Team
CVE-2025-54742

8.8HIGH

Key Information:

Vendor

WordPress

Status
Vendor
CVE Published:
28 August 2025

What is CVE-2025-54742?

The WpEvently plugin by MagePeople Team contains a vulnerability that allows for object injection due to the deserialization of untrusted data. This weakness enables potential attackers to execute malicious code and gain unauthorized access to the system. The issue affects all versions of WpEvently up to and including 4.4.8, emphasizing the critical need for users to update their installations to mitigate risks associated with this vulnerability.

Affected Version(s)

WpEvently <= 4.4.8

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Ananda Dhakal (Patchstack)
.
CVE-2025-54742 : Deserialization Vulnerability in WpEvently by MagePeople Team