CVE-2025-15438

Source
https://cve.org/CVERecord?id=CVE-2025-15438
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-15438.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-15438
Downstream
Published
2026-01-02T15:15:59.400Z
Modified
2026-03-15T14:52:21.725118Z
Severity
  • 7.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability was determined in PluXml up to 5.8.22. Affected is the function FileCookieJar::__destruct of the file core/admin/medias.php of the component Media Management Module. Executing a manipulation of the argument File can lead to deserialization. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was informed early about this issue and announced that "[w]e fix this issue in the next version 5.8.23". A patch for it is ready.

References

Affected packages

Git / github.com/pluxml/pluxml

Affected ranges

Type
GIT
Repo
https://github.com/pluxml/pluxml
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "5.8.22"
        }
    ]
}

Affected versions

5.*
5.1.7
5.2
5.3
5.3.1
5.4
5.5
5.6
5.8.9
v5.*
v5.7
v5.8
v5.8-rc
v5.8.1
v5.8.10
v5.8.11
v5.8.12
v5.8.13
v5.8.14
v5.8.15
v5.8.16
v5.8.17
v5.8.18
v5.8.19
v5.8.2
v5.8.20
v5.8.21
v5.8.22
v5.8.3
v5.8.4
v5.8.5
v5.8.6
v5.8.7
v5.8.8
v5.8.9

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-15438.json"