CVE-2025-9191: CWE-502 Deserialization of Untrusted Data in favethemes Houzez
CVE-2025-9191 is a medium severity vulnerability in the Houzez WordPress theme that allows PHP Object Injection via deserialization of untrusted data in saved-search-item. php. It affects all versions up to 4. 1. 6 and requires at least Subscriber-level authentication. The vulnerability alone does not lead to exploitation unless another plugin or theme with a PHP Object Injection POP chain is installed, which could then enable arbitrary file deletion, data disclosure, or code execution. No known exploits are currently in the wild. The vulnerability impacts confidentiality, integrity, and availability with a CVSS score of 6. 3. European organizations using Houzez and additional vulnerable plugins/themes are at risk.
AI Analysis
Technical Summary
CVE-2025-9191 is a PHP Object Injection vulnerability classified under CWE-502, affecting the Houzez WordPress theme up to version 4.1.6. The vulnerability arises from unsafe deserialization of untrusted input in the saved-search-item.php file, allowing authenticated users with Subscriber-level privileges or higher to inject crafted PHP objects. However, the vulnerability's impact is conditional; no proof-of-concept (POP) gadget chain exists within Houzez itself, so exploitation requires the presence of another plugin or theme that contains a POP chain enabling malicious payload execution. If such a POP chain exists, attackers could leverage this to delete arbitrary files, access sensitive data, or execute arbitrary code on the server, potentially leading to full site compromise. The vulnerability does not require user interaction beyond authentication and has a network attack vector, making it moderately easy to exploit in environments where multiple vulnerable components coexist. The CVSS 3.1 score of 6.3 reflects a medium severity, considering the need for authentication but the high impact on confidentiality, integrity, and availability if exploited. No known exploits have been reported in the wild as of now, but the risk remains significant for sites combining Houzez with other vulnerable plugins or themes.
Potential Impact
For European organizations, especially those in the real estate sector or using WordPress sites with the Houzez theme, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized data disclosure, site defacement, or service disruption, impacting business continuity and reputation. The requirement for authenticated access limits exposure but does not eliminate risk, as Subscriber-level accounts are common and easier to compromise through phishing or credential stuffing. Organizations relying on multiple WordPress plugins increase the attack surface, as the presence of a POP chain in other components is necessary for full exploitation. This vulnerability could facilitate lateral movement or privilege escalation within compromised sites, potentially affecting customer data privacy and violating GDPR regulations. Additionally, disruption of web services could impact customer engagement and revenue streams. The medium CVSS score suggests prioritizing remediation but not immediate emergency response unless combined with other vulnerabilities.
Mitigation Recommendations
1. Immediately audit all WordPress installations using the Houzez theme to identify versions up to 4.1.6 and upgrade to a patched version once available. 2. Conduct a thorough inventory of all installed plugins and themes to detect any that contain PHP Object Injection POP chains; remove or update these components to eliminate gadget chains. 3. Restrict Subscriber-level account creation and monitor for suspicious account activity to reduce the risk of attacker footholds. 4. Implement strict input validation and sanitization controls where possible, especially around deserialization functions. 5. Employ Web Application Firewalls (WAFs) configured to detect and block suspicious serialized payloads targeting saved-search-item.php or similar endpoints. 6. Regularly review and tighten WordPress user permissions to minimize unnecessary privileges. 7. Monitor logs for unusual file deletions, code execution attempts, or data access patterns indicative of exploitation attempts. 8. Educate site administrators on the risks of installing unvetted plugins or themes that may introduce POP chains. 9. Consider isolating critical WordPress instances or using containerization to limit the blast radius of potential exploits.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland
CVE-2025-9191: CWE-502 Deserialization of Untrusted Data in favethemes Houzez
Description
CVE-2025-9191 is a medium severity vulnerability in the Houzez WordPress theme that allows PHP Object Injection via deserialization of untrusted data in saved-search-item. php. It affects all versions up to 4. 1. 6 and requires at least Subscriber-level authentication. The vulnerability alone does not lead to exploitation unless another plugin or theme with a PHP Object Injection POP chain is installed, which could then enable arbitrary file deletion, data disclosure, or code execution. No known exploits are currently in the wild. The vulnerability impacts confidentiality, integrity, and availability with a CVSS score of 6. 3. European organizations using Houzez and additional vulnerable plugins/themes are at risk.
AI-Powered Analysis
Technical Analysis
CVE-2025-9191 is a PHP Object Injection vulnerability classified under CWE-502, affecting the Houzez WordPress theme up to version 4.1.6. The vulnerability arises from unsafe deserialization of untrusted input in the saved-search-item.php file, allowing authenticated users with Subscriber-level privileges or higher to inject crafted PHP objects. However, the vulnerability's impact is conditional; no proof-of-concept (POP) gadget chain exists within Houzez itself, so exploitation requires the presence of another plugin or theme that contains a POP chain enabling malicious payload execution. If such a POP chain exists, attackers could leverage this to delete arbitrary files, access sensitive data, or execute arbitrary code on the server, potentially leading to full site compromise. The vulnerability does not require user interaction beyond authentication and has a network attack vector, making it moderately easy to exploit in environments where multiple vulnerable components coexist. The CVSS 3.1 score of 6.3 reflects a medium severity, considering the need for authentication but the high impact on confidentiality, integrity, and availability if exploited. No known exploits have been reported in the wild as of now, but the risk remains significant for sites combining Houzez with other vulnerable plugins or themes.
Potential Impact
For European organizations, especially those in the real estate sector or using WordPress sites with the Houzez theme, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized data disclosure, site defacement, or service disruption, impacting business continuity and reputation. The requirement for authenticated access limits exposure but does not eliminate risk, as Subscriber-level accounts are common and easier to compromise through phishing or credential stuffing. Organizations relying on multiple WordPress plugins increase the attack surface, as the presence of a POP chain in other components is necessary for full exploitation. This vulnerability could facilitate lateral movement or privilege escalation within compromised sites, potentially affecting customer data privacy and violating GDPR regulations. Additionally, disruption of web services could impact customer engagement and revenue streams. The medium CVSS score suggests prioritizing remediation but not immediate emergency response unless combined with other vulnerabilities.
Mitigation Recommendations
1. Immediately audit all WordPress installations using the Houzez theme to identify versions up to 4.1.6 and upgrade to a patched version once available. 2. Conduct a thorough inventory of all installed plugins and themes to detect any that contain PHP Object Injection POP chains; remove or update these components to eliminate gadget chains. 3. Restrict Subscriber-level account creation and monitor for suspicious account activity to reduce the risk of attacker footholds. 4. Implement strict input validation and sanitization controls where possible, especially around deserialization functions. 5. Employ Web Application Firewalls (WAFs) configured to detect and block suspicious serialized payloads targeting saved-search-item.php or similar endpoints. 6. Regularly review and tighten WordPress user permissions to minimize unnecessary privileges. 7. Monitor logs for unusual file deletions, code execution attempts, or data access patterns indicative of exploitation attempts. 8. Educate site administrators on the risks of installing unvetted plugins or themes that may introduce POP chains. 9. Consider isolating critical WordPress instances or using containerization to limit the blast radius of potential exploits.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-08-19T16:59:01.385Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6926f4dc6359f79d7175be81
Added to database: 11/26/2025, 12:38:52 PM
Last enriched: 12/3/2025, 1:48:39 PM
Last updated: 1/10/2026, 10:15:05 PM
Views: 71
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0824: Cross Site Scripting in questdb ui
MediumCVE-2025-13393: CWE-918 Server-Side Request Forgery (SSRF) in marceljm Featured Image from URL (FIFU)
MediumCVE-2025-12379: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in averta Shortcodes and extra features for Phlox theme
MediumCVE-2026-0822: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumCVE-2026-0821: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.