Object Injection Vulnerability in Subscribe to Download by WordPress
CVE-2025-60224

9.8CRITICAL

Key Information:

Vendor

WordPress

Vendor
CVE Published:
22 October 2025

What is CVE-2025-60224?

A vulnerability exists in the Subscribe to Download plugin for WordPress that allows for object injection due to the deserialization of untrusted data. This weakness enables an attacker to potentially exploit the plugin when malicious data is processed, which can lead to unauthorized access or manipulation of the web application. This issue affects all versions up to and including 2.0.9, posing significant security risks for sites using this plugin.

Affected Version(s)

Subscribe to Download <= n/a

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

João Pedro S Alcântara (Kinorth) (Patchstack Alliance)
.