Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-1542
PUBLISHED
More InfoOfficial Page
Assigner-WPScan
Assigner Org ID-1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81
View Known Exploited Vulnerability (KEV) details
Published At-28 Feb, 2026 | 06:00
Updated At-28 Feb, 2026 | 06:00
Rejected At-
▼CVE Numbering Authority (CNA)
Super Stage WP <= 1.0.1 - Unauthenticated PHP Object Injection

The Super Stage WP WordPress plugin through 1.0.1 unserializes user input via REQUEST, which could allow unauthenticated users to perform PHP Object Injection when a suitable gadget is present on the blog.

Affected Products
Vendor
Unknown
Product
Super Stage WP
Default Status
affected
Versions
Affected
  • From 0 through 1.0.1 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-502CWE-502 Deserialization of Untrusted Data
Type: CWE
CWE ID: CWE-502
Description: CWE-502 Deserialization of Untrusted Data
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

finder
yiğit ibrahim sağlam
coordinator
WPScan
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://wpscan.com/vulnerability/d6e3041f-62e8-49ba-8806-59a1c07ec43d/
exploit
vdb-entry
technical-description
Hyperlink: https://wpscan.com/vulnerability/d6e3041f-62e8-49ba-8806-59a1c07ec43d/
Resource:
exploit
vdb-entry
technical-description
Details not found