Description
Deserialization of Untrusted Data vulnerability in Chouby Polylang polylang allows Object Injection.This issue affects Polylang: from n/a through <= 3.7.3.
Published: 2025-10-31
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Deserialization of untrusted data in the Polylang plugin allows an attacker to inject a crafted object that can be executed as code. This improper handling of external input constitutes a classic Object Injection flaw (CWE‑502). The vulnerability can lead to arbitrary code execution on the target server, compromising confidentiality, integrity, and availability of the website.

Affected Systems

The flaw affects all versions of the Polylang plugin supplied by Chouby that are 3.7.3 or older, regardless of WordPress version. Any installations that have not upgraded beyond 3.7.3 are potentially exposed.

Risk and Exploitability

The CVSS score of 8.8 indicates a high severity. EPSS is below 1 %, signalling a low current exploitation likelihood, and the vulnerability is not listed in the CISA KEV catalog. Nevertheless, exploitation requires only that an attacker can supply untrusted data to the plugin, for example via a crafted HTTP request, which suggests a remote attack vector is possible. Defenders should assume the risk can be materialized until the plugin is updated or mitigated.

Generated by OpenCVE AI on April 29, 2026 at 12:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Polylang plugin update (version 3.7.4 or newer) to eliminate the deserialization flaw.
  • If an update is not immediately available, disable or remove the Polylang plugin from the live site to prevent unauthenticated input from reaching the vulnerable code.
  • Implement strict input validation or a whitelist approach for any data that the plugin processes to reduce the chance of malicious payloads being accepted.

Generated by OpenCVE AI on April 29, 2026 at 12:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Thu, 13 Nov 2025 11:30:00 +0000


Thu, 13 Nov 2025 10:45:00 +0000


Mon, 03 Nov 2025 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Fri, 31 Oct 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 31 Oct 2025 11:45:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in Chouby Polylang polylang allows Object Injection.This issue affects Polylang: from n/a through <= 3.7.3.
Title WordPress Polylang plugin <= 3.7.3 - Deserialization of untrusted data vulnerability
Weaknesses CWE-502
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T18:30:21.297Z

Reserved: 2025-10-31T11:23:06.889Z

Link: CVE-2025-64353

cve-icon Vulnrichment

Updated: 2025-10-31T18:57:39.949Z

cve-icon NVD

Status : Deferred

Published: 2025-10-31T12:15:35.653

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-64353

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T12:45:11Z

Weaknesses