PatioTime – Restaurant WordPress Theme Vulnerability (High) – CVE-2…

PatioTime – Restaurant WordPress Theme Vulnerability (High) – CVE-2…

by | Feb 17, 2026 | Themes

Attack Vectors

CVE-2025-67995 affects the PatioTime – Restaurant WordPress Theme (slug: patiotime) in versions below 2.1 and is rated High severity (CVSS 8.1). The issue is an unauthenticated PHP Object Injection risk triggered when untrusted input is deserialized.

Because no login is required, the most relevant business scenario is an external attacker probing public-facing WordPress sites using the PatioTime theme and attempting to pass crafted input to any vulnerable theme functionality. While exploitation details can vary, the defining risk is that the attacker can inject a PHP object without needing user interaction.

Security Weakness

The underlying weakness is unsafe deserialization of untrusted input in PatioTime versions up to 2.1. When applications deserialize attacker-controlled data, it can allow object injection, which is dangerous because injected objects may trigger unintended behaviors.

Importantly, the published advisory notes that no known POP chain is present in the vulnerable software. However, the risk can escalate if a POP chain exists elsewhere on the site (for example, through an additional plugin or theme installed on the same WordPress instance). In that situation, the injected object could potentially be used to carry out more damaging actions.

Technical or Business Impacts

If a usable POP chain is present on the target system, this vulnerability could enable outcomes such as arbitrary file deletion, retrieval of sensitive data, or even remote code execution. From a business-risk perspective, that translates into potential website defacement, loss of customer trust, exposure of confidential data, service disruption, and incident-response and legal/compliance costs.

For marketing directors and executives, the practical risk is brand and revenue impact: downtime during campaigns, damaged SEO and paid traffic efficiency, loss of lead flow, and reputational harm if customer data or site content is compromised. Compliance teams should consider whether compromised content or data access could trigger reporting obligations depending on what the WordPress site stores or integrates with.

Remediation: Update PatioTime to version 2.1 or a newer patched version. Because the severity is High and the attack is unauthenticated, prioritize the update across all sites using the patiotime theme and review installed plugins/themes to reduce the chance that a POP chain exists in the broader environment.

Similar Attacks

Unsafe deserialization and PHP object injection have been used in real-world incidents and disclosures affecting widely used software ecosystems. Examples include:

US-CERT Alert TA18-201A (Apache Struts vulnerability leveraged for compromise)
CVE-2017-5638 (Apache Struts)
CVE-2015-4852 (Oracle WebLogic deserialization)

Reference for this PatioTime issue: CVE-2025-67995 and the vendor analysis at Wordfence Threat Intel.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers