Estate Vulnerability (High) – CVE-2026-22475

Estate Vulnerability (High) – CVE-2026-22475

by | Mar 12, 2026 | Themes

Attack Vectors

Estate (WordPress theme) versions up to and including 1.3.4 are affected by CVE-2026-22475, rated High severity with a CVSS 8.1 score (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). The issue can be triggered remotely over the network and does not require a logged-in user, which means your public-facing site may be exposed.

The attack relies on sending crafted input that the theme may deserialize. While the CVSS vector reflects high attack complexity, this should not be mistaken for “low risk”—it often means attackers need the right conditions, not that exploitation is unlikely.

Security Weakness

This vulnerability is a PHP Object Injection risk caused by deserialization of untrusted input. In practical terms, the theme can be coerced into treating attacker-supplied data as internal objects.

According to the published research, there is no known POP chain in the vulnerable theme itself. However, PHP object injection becomes significantly more dangerous when any additional plugin or theme on the site provides usable “gadgets” (a POP chain). In that scenario, the combination of components—rather than Estate alone—can enable serious outcomes.

At the time of writing, there is no known patch available. As a result, mitigation and risk acceptance decisions need to be made deliberately, based on business impact and compliance obligations. (Source: Wordfence vulnerability record; CVE record: CVE-2026-22475.)

Technical or Business Impacts

If an attacker can pair this Estate theme weakness with a POP chain available elsewhere in your WordPress stack, the potential impacts can be severe: arbitrary file deletion (which can take a site offline), retrieval of sensitive data (customer records, leads, form submissions, invoices, API keys), or even code execution (full site takeover).

From a business perspective, that translates into downtime and lost revenue, brand damage, potential regulatory exposure (privacy and contractual requirements), and increased incident response costs (forensics, restoration, stakeholder communications). Marketing teams are often impacted first: campaign landing pages go down, analytics and tracking tags can be altered, and SEO can suffer from defacement or malware warnings.

Given that no patch is currently available, many organizations will consider the most risk-reducing path to be removing/uninstalling Estate and replacing it with a maintained alternative. If replacement cannot happen immediately, common mitigations include reducing the overall “gadget surface” by removing unused plugins/themes, tightening change control, increasing monitoring and alerting for suspicious requests and file changes, and ensuring tested backups and a documented recovery plan are in place.

Similar Attacks

PHP object injection and unsafe deserialization have a history of being used as stepping-stones to major compromises when combined with the right conditions. Notable examples include CVE-2019-8942 (WordPress) and CVE-2015-8562 (Joomla), both of which highlight how deserialization weaknesses can lead to high-impact outcomes when an attacker can reach vulnerable code paths.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers