PHP Object Injection Vulnerability in Nexter Extension – Site Enhancements Toolkit for WordPress
CVE-2026-0726

8.1HIGH

What is CVE-2026-0726?

The Nexter Extension – Site Enhancements Toolkit for WordPress has a security flaw allowing PHP Object Injection due to the deserialization of untrusted input in the 'nxt_unserialize_replace' function. This vulnerability affects all versions up to and including 4.4.6, potentially enabling unauthenticated attackers to inject a PHP object. However, it poses a threat primarily when paired with other plugins or themes that contain a PHP Object Pollution (POP) chain. In such cases, attackers could exploit this vulnerability to delete files, access sensitive data, or execute arbitrary code, leveraging the existing chains of vulnerable components.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Nexter Extension – Site Enhancements Toolkit * <= 4.4.6

References

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Craig Smith
.