Armis Logo< Back

CVE-2026-7647:

CVE-2026-7647 is a PHP Object Injection vulnerability in the Profile Builder Pro WordPress plugin (versions up to and including 3.14.5) that allows unauthenticated attackers to inject arbitrary PHP objects via an unsanitized AJAX handler.


Score
Info
A numerical rating that indicates how dangerous this vulnerability is.

8.1High
  • Published Date:May 2, 2026
  • CISA KEV Date:*No Data*
  • Industries Affected:20

Threat Predictions

  • EPSS Score:0.0
  • EPSS Percentile:1%

Exploitability

  • Score:2.2
  • Attack Vector:NETWORK
  • Attack Complexity:HIGH
  • Privileges Required:NONE
  • User Interaction:NONE
  • Scope:UNCHANGED

Impact

  • Score:5.9
  • Confidentiality Impact:HIGH
  • Integrity Impact:HIGH
  • Availability Impact:HIGH

Description Preview

CVE-2026-7647 is a PHP Object Injection vulnerability in the Profile Builder Pro WordPress plugin (versions up to and including 3.14.5) that allows unauthenticated attackers to inject arbitrary PHP objects via an unsanitized AJAX handler.

Overview

CVE-2026-7647 affects the Profile Builder Pro WordPress plugin up to and including version 3.14.5. The flaw resides in an unauthenticated AJAX handler (`wppb_request_users_pins_action_callback`) located in `add-ons/user-listing/one-map-listing.php`, which deserializes attacker-supplied input from the `args` POST parameter using `maybe_unserialize()` without any security controls. Because the handler is accessible to unauthenticated users via both `wp_ajax_` and `wp_ajax_nopriv_` hooks, any external attacker can send a malicious POST request to inject arbitrary PHP objects into application memory. The severity of exploitation depends on the presence of a usable POP chain within the target WordPress installation, but the potential impact includes full compromise of confidentiality, integrity, and availability of the affected system, earning this vulnerability a CVSS v3.1 score of 8.1 (HIGH).

Remediation

  • Users of the Profile Builder Pro plugin should update to a version released after 3.14.5 that addresses this vulnerability. The fix should include the addition of nonce verification, strict type checking, and comprehensive input validation on the `args` POST parameter before any deserialization takes place in the `wppb_request_users_pins_action_callback()` handler. Where immediate patching is not feasible, organizations should consider using a web application firewall (WAF) to block malicious AJAX requests targeting the vulnerable handler. Site administrators should also audit installed plugins and themes for POP chain gadgets that could be chained with this vulnerability to escalate impact.

References

Industries Affected

Below is a list of industries most commonly impacted or potentially at risk based on intelligence.

Low
Mining icon
Mining
Utilities icon
Utilities
Information icon
Information
Construction icon
Construction
Retail Trade icon
Retail Trade
Manufacturing icon
Manufacturing
Wholesale Trade icon
Wholesale Trade
Educational Services icon
Educational Services
Finance and Insurance icon
Finance and Insurance
Public Administration icon
Public Administration
Real Estate Rental and Leasing icon
Real Estate Rental and Leasing
Transportation and Warehousing icon
Transportation and Warehousing
Accommodation and Food Services icon
Accommodation and Food Services
Health Care and Social Assistance icon
Health Care and Social Assistance
Arts, Entertainment, and Recreation icon
Arts, Entertainment, and Recreation
Management of Companies and Enterprises icon
Management of Companies and Enterprises
Agriculture, Forestry, Fishing and Hunting icon
Agriculture, Forestry, Fishing and Hunting
Other Services (except Public Administration) icon
Other Services (except Public Administration)
Professional, Scientific, and Technical Services icon
Professional, Scientific, and Technical Services
Administrative and Support and Waste Management and Remediation Services icon
Administrative and Support and Waste Management and Remediation Services

Focus on What Matters

See everything.Identify true risk.Proactively mitigate threats.Book a Demo

Let's talk!