Red Art | Artist Portfolio WordPress Vulnerability (High) – CVE-202…

Red Art | Artist Portfolio WordPress Vulnerability (High) – CVE-202…

by | Feb 26, 2026 | Themes

Attack Vectors

Red Art | Artist Portfolio (WordPress theme slug: redart) is affected by CVE-2025-52828, a High severity issue (CVSS 8.8, vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). The vulnerability is exploitable by an authenticated user with Subscriber-level access or higher.

That matters for business owners because “subscriber” access is commonly obtained through normal site features (e.g., newsletter accounts, customer accounts, membership logins) or through compromised credentials. If your WordPress site allows user registration, or if staff accounts are reused across systems, the barrier to entry for attackers can be lower than it appears.

Official CVE record: https://www.cve.org/CVERecord?id=CVE-2025-52828

Security Weakness

The Red Art theme (versions up to and including 3.8) is vulnerable to PHP Object Injection due to deserialization of untrusted input. In practical terms, this is a class of flaw where the application processes data in a way that can allow an attacker to inject unexpected objects and influence application behavior.

Per the published advisory, no known POP (Property-Oriented Programming) chain is present in the vulnerable software. However, the risk can increase significantly if a POP chain is available through another installed plugin or theme, which could expand what an attacker can do after exploiting this weakness.

Source advisory: Wordfence vulnerability entry

Technical or Business Impacts

In the worst case—particularly if another component on the site provides a usable POP chain—this issue could enable attackers to retrieve sensitive data, delete arbitrary files, or execute code. For executives and compliance teams, those outcomes translate into high-impact business risks: data exposure, service disruption, incident response costs, and potential regulatory/contractual reporting obligations.

Even though exploitation requires an authenticated account, many real-world incidents start with a low-privilege login (stolen credentials, password reuse, or a malicious “subscriber” account created via open registration). From a brand perspective, a compromised site can quickly lead to reputational damage, lost lead flow, and reduced customer trust—especially if the website is a primary marketing and conversion channel.

Remediation: Update Red Art to version 3.9 or a newer patched release. Prioritize this update on any site where user registration is enabled or where multiple plugins/themes are installed (increasing the chance a POP chain exists elsewhere).

Similar Attacks

PHP deserialization and object injection issues have driven major compromises in other widely used platforms, especially when a working gadget/POP chain is available:

  • Joomla! Object Injection / RCE (CVE-2015-8562): NVD entry
  • Drupal REST unserialize leading to RCE (CVE-2019-6340): NVD entry

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers