CVE-2025-64353
Published: 31 October 2025
Description
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Security Summary
CVE-2025-64353 is a Deserialization of Untrusted Data vulnerability (CWE-502) in the Polylang WordPress plugin by Chouby. The flaw enables Object Injection and affects Polylang versions from n/a through 3.7.3. It carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), reflecting high severity due to its potential for significant impacts across confidentiality, integrity, and availability.
An attacker with network access and low privileges, such as an authenticated WordPress user, can exploit this vulnerability with low complexity and no user interaction required. Successful exploitation allows arbitrary object injection via untrusted deserialization, potentially leading to high-level compromise of the affected system.
Mitigation details are available in the Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/polylang/vulnerability/wordpress-polylang-plugin-3-7-3-deserialization-of-untrusted-data-vulnerability?_s_id=cve, which covers the deserialization issue in Polylang 3.7.3.
Details
- CWE(s)
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Deserialization of Untrusted Data (CWE-502) in the Polylang WordPress plugin enables low-privileged remote exploitation leading to potential RCE, directly facilitating T1190: Exploit Public-Facing Application.