Cyber Posture

CVE-2025-64353

High

Published: 31 October 2025

Published
31 October 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0012 30.3th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-64353 is a Deserialization of Untrusted Data vulnerability (CWE-502) in the Polylang WordPress plugin by Chouby. The flaw enables Object Injection and affects Polylang versions from n/a through 3.7.3. It carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), reflecting high severity due to its potential for significant impacts across confidentiality, integrity, and availability.

An attacker with network access and low privileges, such as an authenticated WordPress user, can exploit this vulnerability with low complexity and no user interaction required. Successful exploitation allows arbitrary object injection via untrusted deserialization, potentially leading to high-level compromise of the affected system.

Mitigation details are available in the Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/polylang/vulnerability/wordpress-polylang-plugin-3-7-3-deserialization-of-untrusted-data-vulnerability?_s_id=cve, which covers the deserialization issue in Polylang 3.7.3.

Details

CWE(s)
CWE-502

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Deserialization of Untrusted Data (CWE-502) in the Polylang WordPress plugin enables low-privileged remote exploitation leading to potential RCE, directly facilitating T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References