CVE-2025-60090: Deserialization of Untrusted Data in CRM Perks WP Gravity Forms Insightly
Deserialization of Untrusted Data vulnerability in CRM Perks WP Gravity Forms Insightly gf-insightly allows Object Injection.This issue affects WP Gravity Forms Insightly: from n/a through <= 1.1.6.
AI Analysis
Technical Summary
CVE-2025-60090 is a critical vulnerability identified in the CRM Perks WP Gravity Forms Insightly plugin, specifically affecting versions up to and including 1.1.6. The flaw arises from insecure deserialization of untrusted data, which allows attackers to perform object injection attacks. Deserialization vulnerabilities occur when untrusted input is processed by the application’s deserialization routines without proper validation or sanitization, enabling attackers to manipulate serialized objects to execute arbitrary code or commands. In this case, the vulnerability is remotely exploitable over the network without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). Successful exploitation can lead to full compromise of the affected WordPress site’s confidentiality, integrity, and availability, potentially allowing attackers to execute arbitrary PHP code, access sensitive data, modify site content, or disrupt services. The vulnerability affects the WP Gravity Forms Insightly plugin, which integrates Gravity Forms with the Insightly CRM system, commonly used to capture and manage customer data. Despite no known exploits currently in the wild, the critical severity and ease of exploitation make this a high-priority threat. The absence of available patches at the time of publication increases the urgency for organizations to implement interim mitigations and monitor their environments closely.
Potential Impact
For European organizations, the impact of CVE-2025-60090 can be severe. Many businesses rely on WordPress for their websites and customer engagement platforms, often integrating CRM tools like Insightly to manage client relationships. Exploitation could lead to unauthorized access to sensitive customer data, including personal and financial information, violating GDPR and other data protection regulations, resulting in legal penalties and reputational damage. The ability to execute arbitrary code remotely can also facilitate ransomware attacks, website defacement, or use of compromised servers as pivot points for further network intrusion. E-commerce platforms, government portals, and service providers using the vulnerable plugin are particularly at risk. The disruption of availability could lead to loss of business continuity and customer trust. Given the critical nature of the vulnerability and the potential for widespread exploitation, European organizations must act swiftly to mitigate risks.
Mitigation Recommendations
1. Immediate identification and inventory of WordPress sites using the WP Gravity Forms Insightly plugin, especially versions up to 1.1.6. 2. Apply any available patches or updates from CRM Perks as soon as they are released. If no patch is available, consider temporarily disabling or uninstalling the plugin to eliminate exposure. 3. Restrict access to WordPress administrative interfaces and plugin endpoints via IP whitelisting or VPN to reduce attack surface. 4. Implement Web Application Firewalls (WAFs) with custom rules to detect and block suspicious serialized payloads or object injection attempts targeting the plugin. 5. Monitor logs for unusual activity, including unexpected POST requests to Gravity Forms endpoints or anomalous PHP execution patterns. 6. Conduct regular backups of website data and configurations to enable rapid recovery in case of compromise. 7. Educate site administrators about the risks of installing unverified plugins and the importance of timely updates. 8. Consider deploying runtime application self-protection (RASP) solutions to detect and prevent exploitation attempts in real-time.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-60090: Deserialization of Untrusted Data in CRM Perks WP Gravity Forms Insightly
Description
Deserialization of Untrusted Data vulnerability in CRM Perks WP Gravity Forms Insightly gf-insightly allows Object Injection.This issue affects WP Gravity Forms Insightly: from n/a through <= 1.1.6.
AI-Powered Analysis
Technical Analysis
CVE-2025-60090 is a critical vulnerability identified in the CRM Perks WP Gravity Forms Insightly plugin, specifically affecting versions up to and including 1.1.6. The flaw arises from insecure deserialization of untrusted data, which allows attackers to perform object injection attacks. Deserialization vulnerabilities occur when untrusted input is processed by the application’s deserialization routines without proper validation or sanitization, enabling attackers to manipulate serialized objects to execute arbitrary code or commands. In this case, the vulnerability is remotely exploitable over the network without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). Successful exploitation can lead to full compromise of the affected WordPress site’s confidentiality, integrity, and availability, potentially allowing attackers to execute arbitrary PHP code, access sensitive data, modify site content, or disrupt services. The vulnerability affects the WP Gravity Forms Insightly plugin, which integrates Gravity Forms with the Insightly CRM system, commonly used to capture and manage customer data. Despite no known exploits currently in the wild, the critical severity and ease of exploitation make this a high-priority threat. The absence of available patches at the time of publication increases the urgency for organizations to implement interim mitigations and monitor their environments closely.
Potential Impact
For European organizations, the impact of CVE-2025-60090 can be severe. Many businesses rely on WordPress for their websites and customer engagement platforms, often integrating CRM tools like Insightly to manage client relationships. Exploitation could lead to unauthorized access to sensitive customer data, including personal and financial information, violating GDPR and other data protection regulations, resulting in legal penalties and reputational damage. The ability to execute arbitrary code remotely can also facilitate ransomware attacks, website defacement, or use of compromised servers as pivot points for further network intrusion. E-commerce platforms, government portals, and service providers using the vulnerable plugin are particularly at risk. The disruption of availability could lead to loss of business continuity and customer trust. Given the critical nature of the vulnerability and the potential for widespread exploitation, European organizations must act swiftly to mitigate risks.
Mitigation Recommendations
1. Immediate identification and inventory of WordPress sites using the WP Gravity Forms Insightly plugin, especially versions up to 1.1.6. 2. Apply any available patches or updates from CRM Perks as soon as they are released. If no patch is available, consider temporarily disabling or uninstalling the plugin to eliminate exposure. 3. Restrict access to WordPress administrative interfaces and plugin endpoints via IP whitelisting or VPN to reduce attack surface. 4. Implement Web Application Firewalls (WAFs) with custom rules to detect and block suspicious serialized payloads or object injection attempts targeting the plugin. 5. Monitor logs for unusual activity, including unexpected POST requests to Gravity Forms endpoints or anomalous PHP execution patterns. 6. Conduct regular backups of website data and configurations to enable rapid recovery in case of compromise. 7. Educate site administrators about the risks of installing unverified plugins and the importance of timely updates. 8. Consider deploying runtime application self-protection (RASP) solutions to detect and prevent exploitation attempts in real-time.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-09-25T15:20:09.847Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6943b04e4eb3efac36700394
Added to database: 12/18/2025, 7:42:06 AM
Last enriched: 1/20/2026, 9:41:05 PM
Last updated: 2/6/2026, 6:55:25 AM
Views: 57
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-8149: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri Portal for ArcGIS
MediumCVE-2024-51962: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Esri ArcGIS Server
HighCVE-2024-51954: CWE-284: Improper Access Control in Esri ArcGIS Server
HighCVE-2024-25699: CWE-287 Improper Authentication in Esri Portal for ArcGIS
HighCVE-2026-1998: Memory Corruption in micropython
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.