CVE-2025-15438

A vulnerability was determined in PluXml up to 5.8.22. Affected is the function FileCookieJar::__destruct of the file core/admin/medias.php of the component Media Management Module. Executing a manipulation of the argument File can lead to deserialization. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was informed early about this issue and announced that "[w]e fix this issue in the next version 5.8.23". A patch for it is ready.
References
Link Resource
https://note-hxlab.wetolink.com/share/9SJUnaDcJuqz Exploit Third Party Advisory
https://vuldb.com/?ctiid.339383 Permissions Required VDB Entry
https://vuldb.com/?id.339383 Third Party Advisory VDB Entry
https://vuldb.com/?submit.713989 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:pluxml:pluxml:*:*:*:*:*:*:*:*

History

27 Feb 2026, 03:45

Type Values Removed Values Added
First Time Pluxml pluxml
Pluxml
References () https://note-hxlab.wetolink.com/share/9SJUnaDcJuqz - () https://note-hxlab.wetolink.com/share/9SJUnaDcJuqz - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.339383 - () https://vuldb.com/?ctiid.339383 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.339383 - () https://vuldb.com/?id.339383 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.713989 - () https://vuldb.com/?submit.713989 - Third Party Advisory, VDB Entry
CPE cpe:2.3:a:pluxml:pluxml:*:*:*:*:*:*:*:*

23 Feb 2026, 09:16

Type Values Removed Values Added
Summary (en) A vulnerability was determined in PluXml up to 5.8.22. Affected is the function FileCookieJar::__destruct of the file core/admin/medias.php of the component Media Management Module. Executing manipulation of the argument File can lead to deserialization. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was informed early about this issue and announced that "[w]e fix this issue in the next version 5.8.23". A patch for it is ready. (en) A vulnerability was determined in PluXml up to 5.8.22. Affected is the function FileCookieJar::__destruct of the file core/admin/medias.php of the component Media Management Module. Executing a manipulation of the argument File can lead to deserialization. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was informed early about this issue and announced that "[w]e fix this issue in the next version 5.8.23". A patch for it is ready.

02 Jan 2026, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-02 15:15

Updated : 2026-02-27 03:45


NVD link : CVE-2025-15438

Mitre link : CVE-2025-15438

CVE.ORG link : CVE-2025-15438


JSON object : View

Products Affected

pluxml

  • pluxml
CWE
CWE-20

Improper Input Validation

CWE-502

Deserialization of Untrusted Data