CVE-2026-27417
Published: 05 March 2026
Summary
CVE-2026-27417 is a critical-severity Deserialization of Untrusted Data (CWE-502) vulnerability. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 18.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-2 requires organizations to identify, report, and correct flaws like this deserialization vulnerability by updating the Sweet Date WordPress theme to version 4.0.1 or later.
RA-5 mandates vulnerability scanning to identify the presence of CVE-2026-27417 in deployed Sweet Date theme versions prior to 4.0.1.
SI-10 enforces validation of untrusted inputs to mitigate risks from deserialization of untrusted data in the Sweet Date theme.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
PHP object injection via unsafe deserialization in public-facing WordPress theme directly enables remote unauthenticated exploitation of the web application (T1190).
NVD Description
Deserialization of Untrusted Data vulnerability in SeventhQueen Sweet Date sweetdate allows Object Injection.This issue affects Sweet Date: from n/a through < 4.0.1.
Deeper analysisAI
CVE-2026-27417 is a Deserialization of Untrusted Data vulnerability (CWE-502) in the SeventhQueen Sweet Date WordPress theme, known as sweetdate. It enables Object Injection and affects all versions of the theme from n/a through those prior to 4.0.1.
The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating it can be exploited remotely by unauthenticated attackers with low attack complexity and no user interaction. Successful exploitation could result in high impacts to confidentiality, integrity, and availability.
The Patchstack advisory details the PHP Object Injection vulnerability in the Sweet Date theme and states that it was fixed in version 4.0.1. Mitigation involves updating affected WordPress sites to Sweet Date 4.0.1 or later.
Details
- CWE(s)