Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-15438— PluXml Media Management medias.php __destruct deserialization

CVSS 4.7 · Medium EPSS 0.10% · P28
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-15438

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
PluXml Media Management medias.php __destruct deserialization
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability was determined in PluXml up to 5.8.22. Affected is the function FileCookieJar::__destruct of the file core/admin/medias.php of the component Media Management Module. Executing a manipulation of the argument File can lead to deserialization. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was informed early about this issue and announced that "[w]e fix this issue in the next version 5.8.23". A patch for it is ready.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
可信数据的反序列化
Source: NVD (National Vulnerability Database)
Vulnerability Title
PluXml 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
PluXml是PluXml开源的一个免费的开源内容管理系统,不需要数据库即可工作。 PluXml 5.8.22及之前版本存在代码问题漏洞,该漏洞源于对组件Media Management Module中文件core/admin/medias.php内参数File的错误操作,可能导致反序列化攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-PluXml 5.8.0 cpe:2.3:a:pluxml:pluxml:*:*:*:*:*:*:*:*

II. Public POCs for CVE-2025-15438

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-15438

登录查看更多情报信息。

Same Patch Batch · n/a · 2026-01-02 · 12 CVEs total

CVE-2025-154396.3 MEDIUMDaptin Aggregate API resource_aggregate.go goqu.L sql injection
CVE-2025-154373.5 LOWLigeroSmart Environment Variable cross site scripting
CVE-2025-154193.3 LOWOpen5GS GTPv2-C Flow s5c-handler.c sgwc_s5c_handle_create_session_response denial of servi
CVE-2024-55374REDCap 安全漏洞
CVE-2025-45286go-httpbin 安全漏洞
CVE-2025-67158Revotech I6032W-FHW 安全漏洞
CVE-2025-67160Vatilon IP Cameras 安全漏洞
CVE-2025-67159Vatilon IP Cameras 安全漏洞
CVE-2025-67268gpsd 安全漏洞
CVE-2025-67269gpsd 安全漏洞
CVE-2025-65125online-movie-booking 安全漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2025-15438

No comments yet


Leave a comment