Grand Restaurant WordPress Vulnerability (High) – CVE-2026-23542

Grand Restaurant WordPress Vulnerability (High) – CVE-2026-23542

by | Feb 25, 2026 | Themes

Attack Vectors

Grand Restaurant (WordPress theme slug: grandrestaurant) has a High-severity vulnerability (CVE-2026-23542, CVSS 8.1) affecting versions up to and including 7.0.10. The issue can be triggered without authentication, meaning an external attacker can attempt exploitation over the internet.

Because the weakness involves unsafe handling of serialized data, exploitation risk depends on what else is installed on the site. While the vulnerable theme itself has no known “POP chain”, the presence of a usable chain in another plugin or theme on the same WordPress instance could allow the attacker to escalate the impact significantly.

Reference: CVE-2026-23542 and vendor analysis from Wordfence.

Security Weakness

The Grand Restaurant theme is vulnerable to PHP Object Injection due to deserialization of untrusted input in versions <= 7.0.10. In practical terms, this means the site may accept attacker-supplied data and process it in a way that can create unexpected PHP objects.

Importantly, Wordfence notes no known POP chain is present in the vulnerable software. However, organizations should treat this as a serious risk because WordPress sites commonly run multiple plugins/themes; a POP chain introduced by another component can turn this into high-impact outcomes (file deletion, data exposure, or even code execution), depending on what is installed.

Technical or Business Impacts

For business owners, marketing leaders, and compliance teams, the main concern is that this weakness is unauthenticated and could be reachable from the public internet. If an attacker can combine this vulnerability with a POP chain from another installed component, potential outcomes may include retrieving sensitive data, deleting arbitrary files, or executing code on the server.

The business impacts can include brand and revenue damage from site defacement or downtime, disruption to lead generation and online reservations/e-commerce, incident response and forensics costs, and potential compliance exposure if customer or employee data is accessed. Even when the worst-case chain is not present, attempted exploitation can still drive security noise, operational distraction, and elevated risk until patched.

Remediation: update Grand Restaurant to version 7.0.11 or newer. Also review installed plugins/themes for unnecessary components, ensure you have recent offline backups, and consider adding monitoring and a web application firewall (WAF) policy to reduce exposure to common exploitation attempts while patching is completed.

Similar Attacks

Object injection and unsafe deserialization issues have been used in real-world attacks across popular web platforms, especially when attackers can chain multiple weaknesses together. Examples include:

CVE-2015-8562 (Joomla) — PHP Object Injection leading to remote code execution in certain conditions
CVE-2019-8942 (WordPress) — a core WordPress issue that could be leveraged for severe impacts in specific scenarios

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers