Description
Deserialization of Untrusted Data vulnerability in leafcolor Applay - Shortcodes applay-shortcodes allows Object Injection.This issue affects Applay - Shortcodes: from n/a through <= 3.7.
Published: 2026-02-20
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

Deserialization of untrusted data in the Applay - Shortcodes plugin enables PHP object injection. The flaw permits an attacker to craft arbitrary serialized objects that are processed by the plugin, potentially leading to code execution or unauthorized manipulation of the WordPress site. While the impact on confidentiality, integrity, and availability is largely determined by the attacker’s payload, the high severity rating suggests a capability for remote code execution and other critical damage.

Affected Systems

The vulnerability affects the WordPress plugin Applay - Shortcodes distributed by leafcolor, specifically all releases through version 3.7. Systems running this plugin on any WordPress installation are potentially exposed. No specific operating system or database version restrictions are listed.

Risk and Exploitability

The CVSS score of 9.8 indicates a high risk. The EPSS score of less than 1% implies that, at present, exploitation attempts are rare, but the lack of a KEV listing does not eliminate the possibility of future exploitation. Based on the description, the likely attack surface is a remote attacker submitting malicious serialized data to the plugin, which is then deserialized within the application context. Triggering the vulnerability would require the attacker to deliver the crafted payload through a user-facing interface that does not properly sanitize input.

Generated by OpenCVE AI on April 28, 2026 at 17:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Applay - Shortcodes plugin to a version newer than 3.7, if available, or obtain a vendor‑supplied patch that removes the untrusted deserialization.
  • If an upgrade is not immediately possible, consider disabling or deactivating the plugin until a fix is applied.
  • Implement stricter input validation for any data that reaches the plugin, and enforce the principle that only trusted WordPress users can provide data that may be deserialized.

Generated by OpenCVE AI on April 28, 2026 at 17:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Tue, 24 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Leafcolor
Leafcolor applay - Shortcodes
Wordpress
Wordpress wordpress
Vendors & Products Leafcolor
Leafcolor applay - Shortcodes
Wordpress
Wordpress wordpress

Fri, 20 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in leafcolor Applay - Shortcodes applay-shortcodes allows Object Injection.This issue affects Applay - Shortcodes: from n/a through <= 3.7.
Title WordPress Applay - Shortcodes plugin <= 3.7 - PHP Object Injection vulnerability
Weaknesses CWE-502
References

Subscriptions

Leafcolor Applay - Shortcodes
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:53:38.560Z

Reserved: 2026-01-07T12:21:40.878Z

Link: CVE-2026-22384

cve-icon Vulnrichment

Updated: 2026-02-24T18:28:34.708Z

cve-icon NVD

Status : Deferred

Published: 2026-02-20T16:22:38.090

Modified: 2026-04-28T19:36:33.413

Link: CVE-2026-22384

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T17:45:16Z

Weaknesses