Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60082: Deserialization of Untrusted Data in add-ons.org PDF for WPForms

0
High
VulnerabilityCVE-2025-60082cvecve-2025-60082
Published: Thu Dec 18 2025 (12/18/2025, 07:22:07 UTC)
Source: CVE Database V5
Vendor/Project: add-ons.org
Product: PDF for WPForms

Description

Deserialization of Untrusted Data vulnerability in add-ons.org PDF for WPForms pdf-for-wpforms allows Object Injection.This issue affects PDF for WPForms: from n/a through <= 6.3.1.

AI-Powered Analysis

AILast updated: 01/20/2026, 21:39:42 UTC

Technical Analysis

CVE-2025-60082 is a deserialization of untrusted data vulnerability found in the PDF for WPForms plugin developed by add-ons.org, affecting all versions up to and including 6.3.1. This vulnerability allows an attacker to perform object injection by exploiting the plugin’s unsafe deserialization process. Deserialization vulnerabilities occur when untrusted input is parsed into objects without proper validation or sanitization, enabling attackers to inject malicious objects that can execute arbitrary code or manipulate application logic. The CVSS 3.1 base score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with an attack vector over the network (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), and no user interaction (UI:N). The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component. Exploitation could lead to remote code execution, data theft, or service disruption. Although no public exploits are currently known, the nature of the vulnerability and the widespread use of WPForms in WordPress sites make it a critical risk. The vulnerability was reserved in September 2025 and published in December 2025, indicating recent discovery and disclosure. The lack of available patches at the time of reporting increases exposure. Organizations using this plugin should consider this a critical security issue requiring immediate attention.

Potential Impact

For European organizations, the impact of CVE-2025-60082 can be severe. WPForms is a popular WordPress plugin used for creating web forms, and the PDF for WPForms add-on extends functionality to generate PDFs from form data. Exploitation could allow attackers to execute arbitrary code on web servers, leading to full system compromise, data breaches, and disruption of services. This can affect confidentiality by exposing sensitive user data collected via forms, integrity by altering stored or processed data, and availability by causing denial of service or server crashes. Organizations in sectors such as finance, healthcare, government, and e-commerce that rely on WordPress forms for customer interaction or data collection are particularly vulnerable. The ease of exploitation over the network without user interaction increases the risk of automated attacks and widespread exploitation. Additionally, compromised web servers can be used as pivot points for lateral movement within corporate networks, amplifying the damage. The absence of known exploits currently provides a window for proactive mitigation, but the high severity demands urgent action.

Mitigation Recommendations

1. Immediate patching: Monitor add-ons.org and WPForms for official security updates or patches addressing CVE-2025-60082 and apply them as soon as available. 2. Access controls: Restrict access to the WordPress admin panel and plugin functionalities to trusted IP addresses or VPN users to reduce exposure. 3. Web Application Firewall (WAF): Deploy and configure WAF rules to detect and block malicious deserialization payloads and unusual POST requests targeting the PDF for WPForms endpoints. 4. Input validation: Implement additional server-side input validation and sanitization for form data and PDF generation inputs to reduce injection risks. 5. Plugin audit: Conduct security audits of all WordPress plugins, especially those handling serialized data, to identify and remediate similar vulnerabilities. 6. Monitoring and logging: Enable detailed logging of web requests and monitor for indicators of exploitation attempts, such as unusual object injection patterns or errors related to deserialization. 7. Principle of least privilege: Run WordPress and its plugins with minimal privileges necessary to limit the impact of a successful exploit. 8. Backup and recovery: Maintain regular backups of website data and configurations to enable rapid recovery in case of compromise. 9. User awareness: Educate administrators about the risks of untrusted data deserialization and the importance of timely updates.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-09-25T15:20:02.782Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6943b04e4eb3efac36700382

Added to database: 12/18/2025, 7:42:06 AM

Last enriched: 1/20/2026, 9:39:42 PM

Last updated: 2/6/2026, 2:40:07 PM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats