Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60178: Deserialization of Untrusted Data in CRM Perks WP Gravity Forms HubSpot

0
Critical
VulnerabilityCVE-2025-60178cvecve-2025-60178
Published: Thu Dec 18 2025 (12/18/2025, 07:22:09 UTC)
Source: CVE Database V5
Vendor/Project: CRM Perks
Product: WP Gravity Forms HubSpot

Description

Deserialization of Untrusted Data vulnerability in CRM Perks WP Gravity Forms HubSpot gf-hubspot allows Object Injection.This issue affects WP Gravity Forms HubSpot: from n/a through <= 1.2.6.

AI-Powered Analysis

AILast updated: 12/18/2025, 08:29:35 UTC

Technical Analysis

CVE-2025-60178 is a vulnerability in the CRM Perks WP Gravity Forms HubSpot plugin, specifically versions up to 1.2.6, that arises from the unsafe deserialization of untrusted data. Deserialization is the process of converting data from a format suitable for storage or transmission back into an object in memory. When this process is performed on untrusted input without proper validation or sanitization, it can lead to object injection attacks. In this case, the vulnerability allows an attacker to inject malicious objects during deserialization, potentially leading to arbitrary code execution, privilege escalation, or data manipulation within the WordPress environment. The plugin integrates Gravity Forms, a popular WordPress form builder, with HubSpot CRM, enabling automated data transfer between form submissions and the CRM system. Exploiting this vulnerability could allow attackers to compromise the confidentiality, integrity, and availability of data managed through this integration. Although no public exploits are reported yet, the nature of deserialization vulnerabilities makes them attractive targets for attackers due to the possibility of remote exploitation without authentication. The vulnerability affects all versions up to and including 1.2.6, and no patch links are currently available, indicating that remediation may still be pending. The vulnerability was reserved in September 2025 and published in December 2025, reflecting recent discovery and disclosure.

Potential Impact

For European organizations, the impact of CVE-2025-60178 could be significant, especially for those using WordPress sites integrated with HubSpot CRM via the vulnerable plugin. Successful exploitation could lead to unauthorized access to sensitive customer data, manipulation of CRM records, or full system compromise. This could result in data breaches violating GDPR regulations, leading to legal penalties and reputational damage. Additionally, attackers could disrupt business operations by injecting malicious code or altering form data flows, impacting marketing and sales processes. The integration nature of the plugin means that both web-facing and backend CRM systems could be affected, increasing the attack surface. Organizations in sectors such as finance, healthcare, and retail, which heavily rely on customer data and CRM systems, may face elevated risks. The absence of known exploits currently provides a window for proactive mitigation, but the ease of exploitation without authentication raises urgency for patching or applying mitigations.

Mitigation Recommendations

1. Monitor the CRM Perks vendor and WordPress plugin repositories closely for an official patch addressing CVE-2025-60178 and apply it immediately upon release. 2. Until a patch is available, disable or remove the WP Gravity Forms HubSpot plugin if it is not critical to business operations. 3. Implement strict input validation and sanitization on all data inputs that interact with the plugin, especially those that could be deserialized. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious serialized payloads targeting the plugin. 5. Restrict access to WordPress administrative interfaces and plugin files to trusted IP addresses and authenticated users only. 6. Conduct regular security audits and code reviews focusing on deserialization processes within custom or third-party plugins. 7. Educate development and IT teams about the risks of unsafe deserialization and secure coding practices. 8. Backup WordPress sites and CRM data regularly to enable rapid recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-09-25T15:28:19.138Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6943b04f4eb3efac36700873

Added to database: 12/18/2025, 7:42:07 AM

Last enriched: 12/18/2025, 8:29:35 AM

Last updated: 12/19/2025, 10:34:07 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats