Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60178: Deserialization of Untrusted Data in CRM Perks WP Gravity Forms HubSpot

0
Critical
VulnerabilityCVE-2025-60178cvecve-2025-60178
Published: Thu Dec 18 2025 (12/18/2025, 07:22:09 UTC)
Source: CVE Database V5
Vendor/Project: CRM Perks
Product: WP Gravity Forms HubSpot

Description

Deserialization of Untrusted Data vulnerability in CRM Perks WP Gravity Forms HubSpot gf-hubspot allows Object Injection.This issue affects WP Gravity Forms HubSpot: from n/a through <= 1.2.6.

AI-Powered Analysis

AILast updated: 01/20/2026, 21:43:48 UTC

Technical Analysis

CVE-2025-60178 is a critical vulnerability affecting the CRM Perks WP Gravity Forms HubSpot plugin for WordPress, specifically versions up to and including 1.2.6. The flaw arises from insecure deserialization of untrusted data, which allows an attacker to perform object injection attacks. Deserialization vulnerabilities occur when an application deserializes data from untrusted sources without proper validation, enabling attackers to manipulate serialized objects to execute arbitrary code or alter application logic. In this case, the vulnerability is remotely exploitable over the network without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). Successful exploitation can lead to complete compromise of the affected WordPress site, including unauthorized access to sensitive data (confidentiality), modification or deletion of data (integrity), and disruption or denial of service (availability). The plugin integrates WordPress Gravity Forms with HubSpot CRM, a popular marketing and sales platform, making it a valuable target for attackers aiming to access customer data or disrupt business operations. Although no known exploits have been reported in the wild yet, the severity and ease of exploitation make this a critical threat that requires immediate attention. The lack of available patches at the time of publication increases the urgency for organizations to implement interim mitigations and monitor for suspicious activity.

Potential Impact

For European organizations, the impact of CVE-2025-60178 can be severe. Many businesses rely on WordPress combined with HubSpot CRM for customer relationship management, marketing automation, and lead generation. Exploitation could lead to unauthorized access to sensitive customer data, including personal identifiable information (PII), violating GDPR and other data protection regulations, resulting in legal and financial penalties. Integrity of business data could be compromised, leading to fraudulent transactions or misinformation. Availability impacts could disrupt critical marketing and sales operations, causing revenue loss and reputational damage. The remote, unauthenticated nature of the exploit increases the risk of widespread automated attacks targeting vulnerable sites across Europe. Organizations with public-facing WordPress sites using the affected plugin are particularly vulnerable to drive-by attacks and targeted intrusions. The threat also extends to managed service providers hosting multiple client sites, amplifying potential damage.

Mitigation Recommendations

1. Immediately inventory all WordPress installations to identify instances of the CRM Perks WP Gravity Forms HubSpot plugin and verify versions. 2. Apply vendor patches as soon as they become available; monitor CRM Perks and WordPress security advisories closely. 3. If patches are not yet available, consider disabling or uninstalling the vulnerable plugin to eliminate exposure. 4. Implement Web Application Firewall (WAF) rules to detect and block suspicious serialized payloads and object injection patterns targeting the plugin endpoints. 5. Restrict access to WordPress admin and plugin endpoints via IP whitelisting or VPN where feasible. 6. Enable and monitor detailed logging for Gravity Forms and HubSpot integration activities to detect anomalous behavior. 7. Conduct regular security scans and penetration tests focusing on deserialization vulnerabilities and plugin security. 8. Educate development and operations teams about the risks of insecure deserialization and secure coding practices. 9. Review and tighten WordPress file permissions and isolate critical systems to limit lateral movement in case of compromise. 10. Prepare incident response plans specific to WordPress plugin exploitation scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-09-25T15:28:19.138Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6943b04f4eb3efac36700873

Added to database: 12/18/2025, 7:42:07 AM

Last enriched: 1/20/2026, 9:43:48 PM

Last updated: 2/7/2026, 9:37:07 PM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats