Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60091: Deserialization of Untrusted Data in CRM Perks WP Gravity Forms Zoho CRM and Bigin

0
Critical
VulnerabilityCVE-2025-60091cvecve-2025-60091
Published: Thu Dec 18 2025 (12/18/2025, 07:22:08 UTC)
Source: CVE Database V5
Vendor/Project: CRM Perks
Product: WP Gravity Forms Zoho CRM and Bigin

Description

Deserialization of Untrusted Data vulnerability in CRM Perks WP Gravity Forms Zoho CRM and Bigin gf-zoho allows Object Injection.This issue affects WP Gravity Forms Zoho CRM and Bigin: from n/a through <= 1.2.9.

AI-Powered Analysis

AILast updated: 01/20/2026, 21:41:20 UTC

Technical Analysis

CVE-2025-60091 is a critical vulnerability in the CRM Perks WP Gravity Forms Zoho CRM and Bigin WordPress plugin, specifically versions up to 1.2.9. The flaw arises from insecure deserialization of untrusted data, which allows attackers to perform object injection attacks. Deserialization vulnerabilities occur when untrusted input is deserialized without proper validation, enabling attackers to manipulate serialized objects to execute arbitrary code or alter application logic. In this case, the vulnerability impacts the 'gf-zoho' component, which integrates Gravity Forms with Zoho CRM and Bigin platforms. The vulnerability is remotely exploitable without authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). Successful exploitation can lead to full compromise of the affected system’s confidentiality, integrity, and availability, including arbitrary code execution, data leakage, and denial of service. Although no public exploits are currently known, the high CVSS score of 9.8 underscores the criticality of this issue. The vulnerability affects organizations using WordPress sites with this plugin to synchronize or manage customer relationship data with Zoho CRM or Bigin, which are popular CRM solutions. Attackers could leverage this flaw to gain persistent access, manipulate CRM data, or pivot within the network. The vulnerability was reserved in late September 2025 and published in December 2025, suggesting recent discovery and disclosure. No official patches or fixes are currently linked, emphasizing the need for immediate risk mitigation.

Potential Impact

For European organizations, this vulnerability poses a severe threat to business continuity and data security, especially for those relying on WordPress-based CRM integrations with Zoho CRM or Bigin. Exploitation could lead to unauthorized access to sensitive customer data, intellectual property theft, and disruption of CRM services critical for sales and customer management. Given the criticality and unauthenticated remote exploitability, attackers could compromise multiple organizations rapidly, potentially affecting supply chains and customer trust. The impact extends beyond data loss to include reputational damage and regulatory penalties under GDPR due to exposure of personal data. Organizations in sectors such as finance, healthcare, retail, and government, which heavily rely on CRM systems, are particularly vulnerable. The lack of known exploits in the wild provides a narrow window for proactive defense, but the high severity demands urgent action to prevent exploitation. Additionally, the integration nature of the plugin means that compromise could facilitate lateral movement within enterprise networks, increasing the overall risk footprint.

Mitigation Recommendations

Immediate mitigation should focus on monitoring and restricting access to WordPress admin interfaces and the affected plugin components. Organizations should apply any available patches from CRM Perks as soon as they are released. In the absence of patches, disabling or uninstalling the WP Gravity Forms Zoho CRM and Bigin plugin is recommended to eliminate the attack surface. Implementing strict input validation and sanitization on all data inputs related to the plugin can reduce risk. Deploying Web Application Firewalls (WAFs) with custom rules to detect and block malicious serialized payloads targeting the plugin’s endpoints can provide interim protection. Regularly audit WordPress installations for outdated plugins and monitor logs for suspicious activity indicative of exploitation attempts. Network segmentation to isolate WordPress servers from critical backend systems can limit attacker lateral movement. Additionally, organizations should review and tighten permissions for WordPress users and CRM integrations to minimize potential damage. Finally, ensure comprehensive backups are maintained and tested to enable rapid recovery if compromise occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-09-25T15:20:09.847Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6943b04f4eb3efac3670086d

Added to database: 12/18/2025, 7:42:07 AM

Last enriched: 1/20/2026, 9:41:20 PM

Last updated: 2/7/2026, 12:27:27 PM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats