Back to VulnFeed / CVE-2026-5127
root@hackertop:~/vulnfeed/CVE-2026-5127#
CVE-2026-5127 HIGH Deserialization ⚠ Unpatched · Zero-day◉ PoC 公开 Lifecycle 4/7

wedevs User Frontend Plugin up to 4.3.1 on WordPress maybe_unserialize wpuf_files deserialization

User Frontend Plugin 13d ago Impact pending confirmation
LIFECYCLE
7.4 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability was found in wedevs User Frontend Plugin up to 4.3.1 on WordPress (WordPress Plugin). It has been classified as critical. This affects the function maybe_unserialize. Upgrading to version 4.2.10 eliminates this vulnerability.
Root Cause Analysis
The manipulation of the argument wpuf_files with an unknown input leads to a unknown weakness. CWE is classifying the issue as CWE-502. The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid.

Impact: This is going to have an impact on confidentiality, integrity, and availability.

Countermeasure: Upgrading to version 4.2.10 eliminates this vulnerability.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2026-5127 · CVSS 7.4 · Active Threat