CVE-2026-24978: Deserialization of Untrusted Data in NooTheme Jobica Core
Deserialization of Untrusted Data vulnerability in NooTheme Jobica Core jobica-core allows Object Injection.This issue affects Jobica Core: from n/a through <= 1.4.1.
AI Analysis
Technical Summary
This vulnerability in NooTheme Jobica Core (<= 1.4.1) arises from unsafe deserialization of untrusted data, enabling attackers to perform object injection attacks. Such attacks can result in remote code execution or other severe impacts. The CVSS v3.1 base score is 8.8, reflecting network attack vector, low attack complexity, requiring low privileges but no user interaction, and resulting in high impact on confidentiality, integrity, and availability.
Potential Impact
Successful exploitation allows attackers to inject malicious objects during deserialization, potentially leading to full system compromise including unauthorized data access, modification, and service disruption. The high CVSS score indicates critical impact on affected systems.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is available, users should consider disabling or restricting deserialization functionality if possible and monitor for updates from NooTheme. No official fix or temporary mitigation has been documented at this time.
CVE-2026-24978: Deserialization of Untrusted Data in NooTheme Jobica Core
Description
Deserialization of Untrusted Data vulnerability in NooTheme Jobica Core jobica-core allows Object Injection.This issue affects Jobica Core: from n/a through <= 1.4.1.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This vulnerability in NooTheme Jobica Core (<= 1.4.1) arises from unsafe deserialization of untrusted data, enabling attackers to perform object injection attacks. Such attacks can result in remote code execution or other severe impacts. The CVSS v3.1 base score is 8.8, reflecting network attack vector, low attack complexity, requiring low privileges but no user interaction, and resulting in high impact on confidentiality, integrity, and availability.
Potential Impact
Successful exploitation allows attackers to inject malicious objects during deserialization, potentially leading to full system compromise including unauthorized data access, modification, and service disruption. The high CVSS score indicates critical impact on affected systems.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is available, users should consider disabling or restricting deserialization functionality if possible and monitor for updates from NooTheme. No official fix or temporary mitigation has been documented at this time.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2026-01-28T09:50:46.305Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69c4115ef4197a8e3b6d610e
Added to database: 3/25/2026, 4:46:22 PM
Last enriched: 5/1/2026, 8:09:50 PM
Last updated: 5/7/2026, 3:09:30 AM
Views: 32
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.