Cyber Posture

CVE-2026-23549

CriticalRCE

Published: 19 February 2026

Published
19 February 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0006 18.8th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-23549 is a critical-severity Deserialization of Untrusted Data (CWE-502) vulnerability. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 18.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Timely flaw remediation through patching the vulnerable WpEvently plugin versions <=5.1.1 directly eliminates the deserialization of untrusted data vulnerability in CVE-2026-23549.

detect

Vulnerability monitoring and scanning identifies systems running affected WpEvently plugin versions exposed to this object injection flaw.

prevent

Information input validation restricts or sanitizes untrusted data prior to deserialization, mitigating object injection exploitation in the plugin.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Direct remote unauthenticated RCE via PHP deserialization/object injection in a public-facing WordPress plugin.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Deserialization of Untrusted Data vulnerability in magepeopleteam WpEvently mage-eventpress allows Object Injection.This issue affects WpEvently: from n/a through <= 5.1.1.

Deeper analysisAI

CVE-2026-23549 is a Deserialization of Untrusted Data vulnerability (CWE-502) in the WpEvently plugin, developed by magepeopleteam and also referred to as mage-eventpress, for WordPress. The flaw enables Object Injection and affects all versions of the plugin from unknown initial release through 5.1.1 inclusive. Published on 2026-02-19, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical severity.

An unauthenticated attacker can exploit the vulnerability remotely over the network with low attack complexity and no requirement for user interaction. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, potentially allowing arbitrary code execution or other severe compromises via injected objects.

The Patchstack advisory documents this PHP Object Injection issue in WpEvently version 5.1.1 and provides details on vulnerability management for the WordPress plugin, available at https://patchstack.com/database/Wordpress/Plugin/mage-eventpress/vulnerability/wordpress-wpevently-plugin-5-1-1-php-object-injection-vulnerability?_s_id=cve.

Details

CWE(s)

CVEs Like This One

CVE-2025-67617Shared CWE-502
CVE-2026-2020Shared CWE-502
CVE-2025-49386Shared CWE-502
CVE-2026-27971Shared CWE-502
CVE-2025-59287Shared CWE-502
CVE-2024-56291Shared CWE-502
CVE-2026-27303Shared CWE-502
CVE-2026-27417Shared CWE-502
CVE-2024-10942Shared CWE-502
CVE-2025-60214Shared CWE-502

References