Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60090: Deserialization of Untrusted Data in CRM Perks WP Gravity Forms Insightly

0
Critical
VulnerabilityCVE-2025-60090cvecve-2025-60090
Published: Thu Dec 18 2025 (12/18/2025, 07:22:08 UTC)
Source: CVE Database V5
Vendor/Project: CRM Perks
Product: WP Gravity Forms Insightly

Description

Deserialization of Untrusted Data vulnerability in CRM Perks WP Gravity Forms Insightly gf-insightly allows Object Injection.This issue affects WP Gravity Forms Insightly: from n/a through <= 1.1.6.

AI-Powered Analysis

AILast updated: 01/20/2026, 21:41:05 UTC

Technical Analysis

CVE-2025-60090 is a critical vulnerability identified in the CRM Perks WP Gravity Forms Insightly plugin, specifically affecting versions up to and including 1.1.6. The flaw arises from insecure deserialization of untrusted data, which allows attackers to perform object injection attacks. Deserialization vulnerabilities occur when untrusted input is processed by the application’s deserialization routines without proper validation or sanitization, enabling attackers to manipulate serialized objects to execute arbitrary code or commands. In this case, the vulnerability is remotely exploitable over the network without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). Successful exploitation can lead to full compromise of the affected WordPress site’s confidentiality, integrity, and availability, potentially allowing attackers to execute arbitrary PHP code, access sensitive data, modify site content, or disrupt services. The vulnerability affects the WP Gravity Forms Insightly plugin, which integrates Gravity Forms with the Insightly CRM system, commonly used to capture and manage customer data. Despite no known exploits currently in the wild, the critical severity and ease of exploitation make this a high-priority threat. The absence of available patches at the time of publication increases the urgency for organizations to implement interim mitigations and monitor their environments closely.

Potential Impact

For European organizations, the impact of CVE-2025-60090 can be severe. Many businesses rely on WordPress for their websites and customer engagement platforms, often integrating CRM tools like Insightly to manage client relationships. Exploitation could lead to unauthorized access to sensitive customer data, including personal and financial information, violating GDPR and other data protection regulations, resulting in legal penalties and reputational damage. The ability to execute arbitrary code remotely can also facilitate ransomware attacks, website defacement, or use of compromised servers as pivot points for further network intrusion. E-commerce platforms, government portals, and service providers using the vulnerable plugin are particularly at risk. The disruption of availability could lead to loss of business continuity and customer trust. Given the critical nature of the vulnerability and the potential for widespread exploitation, European organizations must act swiftly to mitigate risks.

Mitigation Recommendations

1. Immediate identification and inventory of WordPress sites using the WP Gravity Forms Insightly plugin, especially versions up to 1.1.6. 2. Apply any available patches or updates from CRM Perks as soon as they are released. If no patch is available, consider temporarily disabling or uninstalling the plugin to eliminate exposure. 3. Restrict access to WordPress administrative interfaces and plugin endpoints via IP whitelisting or VPN to reduce attack surface. 4. Implement Web Application Firewalls (WAFs) with custom rules to detect and block suspicious serialized payloads or object injection attempts targeting the plugin. 5. Monitor logs for unusual activity, including unexpected POST requests to Gravity Forms endpoints or anomalous PHP execution patterns. 6. Conduct regular backups of website data and configurations to enable rapid recovery in case of compromise. 7. Educate site administrators about the risks of installing unverified plugins and the importance of timely updates. 8. Consider deploying runtime application self-protection (RASP) solutions to detect and prevent exploitation attempts in real-time.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-09-25T15:20:09.847Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6943b04e4eb3efac36700394

Added to database: 12/18/2025, 7:42:06 AM

Last enriched: 1/20/2026, 9:41:05 PM

Last updated: 2/7/2026, 2:08:11 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats