Impact
Deserialization of untrusted data in the Polylang plugin allows an attacker to inject a crafted object that can be executed as code. This improper handling of external input constitutes a classic Object Injection flaw (CWE‑502). The vulnerability can lead to arbitrary code execution on the target server, compromising confidentiality, integrity, and availability of the website.
Affected Systems
The flaw affects all versions of the Polylang plugin supplied by Chouby that are 3.7.3 or older, regardless of WordPress version. Any installations that have not upgraded beyond 3.7.3 are potentially exposed.
Risk and Exploitability
The CVSS score of 8.8 indicates a high severity. EPSS is below 1 %, signalling a low current exploitation likelihood, and the vulnerability is not listed in the CISA KEV catalog. Nevertheless, exploitation requires only that an attacker can supply untrusted data to the plugin, for example via a crafted HTTP request, which suggests a remote attack vector is possible. Defenders should assume the risk can be materialized until the plugin is updated or mitigated.
OpenCVE Enrichment