CVE-2026-23549
Published: 19 February 2026
Summary
CVE-2026-23549 is a critical-severity Deserialization of Untrusted Data (CWE-502) vulnerability. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 18.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Timely flaw remediation through patching the vulnerable WpEvently plugin versions <=5.1.1 directly eliminates the deserialization of untrusted data vulnerability in CVE-2026-23549.
Vulnerability monitoring and scanning identifies systems running affected WpEvently plugin versions exposed to this object injection flaw.
Information input validation restricts or sanitizes untrusted data prior to deserialization, mitigating object injection exploitation in the plugin.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct remote unauthenticated RCE via PHP deserialization/object injection in a public-facing WordPress plugin.
NVD Description
Deserialization of Untrusted Data vulnerability in magepeopleteam WpEvently mage-eventpress allows Object Injection.This issue affects WpEvently: from n/a through <= 5.1.1.
Deeper analysisAI
CVE-2026-23549 is a Deserialization of Untrusted Data vulnerability (CWE-502) in the WpEvently plugin, developed by magepeopleteam and also referred to as mage-eventpress, for WordPress. The flaw enables Object Injection and affects all versions of the plugin from unknown initial release through 5.1.1 inclusive. Published on 2026-02-19, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical severity.
An unauthenticated attacker can exploit the vulnerability remotely over the network with low attack complexity and no requirement for user interaction. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, potentially allowing arbitrary code execution or other severe compromises via injected objects.
The Patchstack advisory documents this PHP Object Injection issue in WpEvently version 5.1.1 and provides details on vulnerability management for the WordPress plugin, available at https://patchstack.com/database/Wordpress/Plugin/mage-eventpress/vulnerability/wordpress-wpevently-plugin-5-1-1-php-object-injection-vulnerability?_s_id=cve.
Details
- CWE(s)