PhotoMe | Photography Portfolio WordPress Vulnerability (High) – CV…

PhotoMe | Photography Portfolio WordPress Vulnerability (High) – CV…

by | Feb 2, 2026 | Themes

Attack Vectors

PhotoMe | Photography Portfolio (WordPress slug: photome) versions up to and including 5.6.11 have a High-severity vulnerability (CVSS 8.1) identified as CVE-2025-69301. The issue is an unauthenticated PHP Object Injection, meaning an attacker can attempt to exploit it over the internet without needing a login.

This risk is relevant to business sites that use PhotoMe as their active theme, especially if the site is publicly accessible (which most marketing sites are). While the attack requires specific conditions to cause the most damaging outcomes, the fact that it is remote and requires no credentials makes it a priority for marketing leaders and executives to track.

Security Weakness

The vulnerability stems from deserialization of untrusted input within PhotoMe (through version 5.6.11). In practical terms, this can allow an attacker to send specially crafted data that the site incorrectly “trusts” and processes in a dangerous way.

According to the published details, there is no known POP chain present in the vulnerable software itself. However, the business risk increases if your WordPress environment contains other plugins or themes that provide the missing “chain” an attacker would need to turn the weakness into high-impact actions.

Remediation note: There is no known patch available at the time of the advisory. Organizations should review the vulnerability details from the source and apply mitigations aligned with risk tolerance. In some cases, it may be best to uninstall the affected theme and replace it.

Technical or Business Impacts

If exploitable conditions exist in your WordPress stack (for example, through an additional plugin or theme that provides a suitable gadget chain), this vulnerability could enable outcomes such as arbitrary file deletion, retrieval of sensitive data, or code execution. Those technical outcomes translate into concrete business impacts: site defacement during campaigns, loss of customer trust, potential exposure of sensitive information, downtime that disrupts lead generation, and costly incident response.

For marketing directors and executives, the key takeaway is risk concentration: a public-facing site running PhotoMe <= 5.6.11 could become the entry point for a broader compromise. Even when the most severe outcomes require additional conditions, the combination of High severity, unauthenticated access, and no known patch can create meaningful operational and compliance risk—especially where the website supports revenue, brand reputation, and regulatory commitments.

Source for the vulnerability details: Wordfence Threat Intelligence entry.

Similar Attacks

While every vulnerability has its own specifics, “unauthenticated” web weaknesses and insecure processing of attacker-supplied input have repeatedly been used to compromise WordPress sites at scale. Examples of real-world incidents and campaigns include:

Wordfence: Zero-day vulnerability in the Yellow Pencil plugin exploited in the wild

Wordfence: Critical vulnerability in Elementor Pro (risk to high-traffic sites and business operations)

Wordfence: Critical WooCommerce Payments vulnerability (potential for serious business disruption)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers