WAFPlanet

CVE Database - Insecure Deserialization

Browse known vulnerabilities with WAF coverage analysis. See which CVEs are detectable by Web Application Firewalls and their OWASP CRS rules.

2433
Matching CVEs
15562
Critical
25943
High
66770
High WAF Coverage

CVE-2026-0677

UNKNOWN
0.00 CVSS none

Deserialization of Untrusted Data vulnerability in TotalSuite TotalContest Lite allows Object Injection.This issue affects TotalContest Lite: from n/a through 2.9.1.

Insecure Deserialization
WAF: Medium

CVE-2026-29109

UNKNOWN
0.00 CVSS none

SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Versions up to and including 8.9.2 contain an unsafe deserialization vulnerability in the SavedSearch filter processing component that allows an authenticated administrator to execute arbitrary system commands on the server. `FilterDefinitionProvider.php` calls `unserialize()` on user-controlled data from the `saved_search.contents` database column without restricting instantiable classes. Version 8.9.3 patches the issue.

Insecure Deserialization
WAF: Medium

CVE-2025-71260

HIGH
8.80 CVSS 3.1

BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain a deserialization of untrusted data vulnerability in the ASP.NET servlet's VIEWSTATE handling that allows authenticated attackers to execute arbitrary code. Attackers can supply crafted serialized objects to the VIEWSTATE parameter to achieve remote code execution and fully compromise the application. The following hotfixes remediate the vulnerability: 20.20.02, 20.20.03.002, 20.21.01.001, 20.21.02.002, 20.22.01, 20.22.01.001, 20.23.01, 20.23.01.002, and 20.24.01.

Insecure Deserialization
WAF: Medium

CVE-2026-25445

UNKNOWN
0.00 CVSS none

Deserialization of Untrusted Data vulnerability in Membership Software WishList Member X allows Object Injection.This issue affects WishList Member X: from n/a through 3.29.0.

Insecure Deserialization
WAF: Medium

CVE-2025-60237

UNKNOWN
0.00 CVSS none

Deserialization of Untrusted Data vulnerability in Themeton Finag allows Object Injection.This issue affects Finag: from n/a through 1.5.0.

Insecure Deserialization
WAF: Medium

CVE-2025-60233

UNKNOWN
0.00 CVSS none

Deserialization of Untrusted Data vulnerability in Themeton Zuut allows Object Injection.This issue affects Zuut: from n/a through 1.4.2.

Insecure Deserialization
WAF: Medium

CVE-2026-27096

UNKNOWN
0.00 CVSS none

Deserialization of Untrusted Data vulnerability in BuddhaThemes ColorFolio - Freelance Designer WordPress Theme allows Object Injection.This issue affects ColorFolio - Freelance Designer WordPress Theme: from n/a through 1.3.

Insecure Deserialization
WAF: Medium

CVE-2026-25873

CRITICAL
9.80 CVSS 3.1

OmniGen2-RL contains an unauthenticated remote code execution vulnerability in the reward server component that allows remote attackers to execute arbitrary commands by sending malicious HTTP POST requests. Attackers can exploit insecure pickle deserialization of request bodies to achieve code execution on the host system running the exposed service.

Insecure Deserialization
WAF: Medium

CVE-2026-25449

UNKNOWN
0.00 CVSS none

Deserialization of Untrusted Data vulnerability in Shinetheme Traveler allows Object Injection.This issue affects Traveler: from n/a before 3.2.8.1.

Insecure Deserialization
WAF: Medium

CVE-2026-25769

UNKNOWN
0.00 CVSS none

Wazuh is a free and open source platform used for threat prevention, detection, and response. Versions 4.0.0 through 4.14.2 have a Remote Code Execution (RCE) vulnerability due to Deserialization of Untrusted Data). All Wazuh deployments using cluster mode (master/worker architecture) and any organization with a compromised worker node (e.g., through initial access, insider threat, or supply chain attack) are impacted. An attacker who gains access to a worker node (through any means) can achieve full RCE on the master node with root privileges. Version 4.14.3 fixes the issue.

Insecure Deserialization
WAF: Medium

CVE-2026-1323

UNKNOWN
0.00 CVSS none

The extension fails to properly define allowed classes used when deserializing transport failure metadata. An attacker may exploit this to execute untrusted serialized code. Note that an active exploit requires write access to the directory configured at $GLOBALS['TYPO3_CONF_VARS']['MAIL']['transport_spool_filepath'].

Insecure Deserialization
WAF: Medium

CVE-2025-54920

UNKNOWN
0.00 CVSS none

This issue affects Apache Spark: before 3.5.7 and 4.0.1. Users are recommended to upgrade to version 3.5.7 or 4.0.1 and above, which fixes the issue. Summary Apache Spark 3.5.4 and earlier versions contain a code execution vulnerability in the Spark History Web UI due to overly permissive Jackson deserialization of event log data. This allows an attacker with access to the Spark event logs directory to inject malicious JSON payloads that trigger deserialization of arbitrary classes, enabling command execution on the host running the Spark History Server. Details The vulnerability arises because the Spark History Server uses Jackson polymorphic deserialization with @JsonTypeInfo.Id.CLASS on SparkListenerEvent objects, allowing an attacker to specify arbitrary class names in the event JSON. This behavior permits instantiating unintended classes, such as org.apache.hive.jdbc.HiveConnection, which can perform network calls or other malicious actions during deserialization. The attacker can exploit this by injecting crafted JSON content into the Spark event log files, which the History Server then deserializes on startup or when loading event logs. For example, the attacker can force the History Server to open a JDBC connection to a remote attacker-controlled server, demonstrating remote command injection capability. Proof of Concept: 1. Run Spark with event logging enabled, writing to a writable directory (spark-logs). 2. Inject the following JSON at the beginning of an event log file: { "Event": "org.apache.hive.jdbc.HiveConnection", "uri": "jdbc:hive2://<IP>:<PORT>/", "info": { "hive.metastore.uris": "thrift://<IP>:<PORT>" } } 3. Start the Spark History Server with logs pointing to the modified directory. 4. The Spark History Server initiates a JDBC connection to the attacker’s server, confirming the injection. Impact An attacker with write access to Spark event logs can execute arbitrary code on the server running the History Server, potentially compromising the entire system.

Insecure Deserialization
WAF: Medium

CVE-2026-32355

UNKNOWN
0.00 CVSS none

Deserialization of Untrusted Data vulnerability in Crocoblock JetEngine jet-engine allows Object Injection.This issue affects JetEngine: from n/a through < 3.8.4.1.

Insecure Deserialization
WAF: Medium

CVE-2025-13913

UNKNOWN
0.00 CVSS none

Inductive Automation Ignition Software is vulnerable to an unauthenticated API endpoint exposure that may allow an attacker to remotely change the "forgot password" recovery email address.

Insecure Deserialization
WAF: Medium

CVE-2026-3060

UNKNOWN
0.00 CVSS none

SGLang' encoder parallel disaggregation system is vulnerable to unauthenticated remote code execution through the disaggregation module, which deserializes untrusted data using pickle.loads() without authentication.

Insecure Deserialization
WAF: Medium

CVE-2026-3059

UNKNOWN
0.00 CVSS none

SGLang's multimodal generation module is vulnerable to unauthenticated remote code execution through the ZMQ broker, which deserializes untrusted data using pickle.loads() without authentication.

Insecure Deserialization
WAF: Medium

CVE-2026-3967

MEDIUM
6.30 CVSS 3.1

A flaw has been found in Alfresco Activiti up to 7.19/8.8.0. Affected by this issue is the function deserialize/createObjectInputStream of the file activiti-core/activiti-engine/src/main/java/org/activiti/engine/impl/variable/SerializableType.java of the component Process Variable Serialization System. This manipulation causes deserialization. Remote exploitation of the attack is possible. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Improper Input Validation Insecure Deserialization
WAF: Medium

CVE-2026-22248

UNKNOWN
0.00 CVSS none

GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. From 11.0.0 to before 11.0.5, an authenticated technician user can upload a malicious file and trigger its execution through an unsafe PHP instantiation. This vulnerability is fixed in 11.0.5.

Insecure Deserialization
WAF: Medium

CVE-2026-2626

UNKNOWN
0.00 CVSS none

The divi-booster WordPress plugin before 5.0.2 does not have authorization and CSRF checks in one of its fixing function, allowing unauthenticated users to modify stored divi-booster WordPress plugin before 5.0.2 options. Furthermore, due to the use of unserialize() on the data, this could be further exploited when combined with a PHP gadget chain to achieve PHP Object Injection

Cross-Site Request Forgery (CSRF) Insecure Deserialization
WAF: Medium

CVE-2026-26114

HIGH
8.80 CVSS 3.1

Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.

Insecure Deserialization
WAF: Medium

CVE-2026-25166

HIGH
7.80 CVSS 3.1

Deserialization of untrusted data in Windows System Image Manager allows an authorized attacker to execute code locally.

Insecure Deserialization
WAF: Medium

CVE-2026-1286

UNKNOWN
0.00 CVSS none

CWE-502: Deserialization of untrusted data vulnerability exists that could lead to loss of confidentiality, integrity and potential remote code execution on workstation when an admin authenticated user opens a malicious project file.

Insecure Deserialization
WAF: Medium

CVE-2025-56422

UNKNOWN
0.00 CVSS none

A deserialization vulnerability in LimeSurvey before v6.15.0+250623 allows a remote attacker to execute arbitrary code on the server.

Insecure Deserialization
WAF: Medium

CVE-2025-11739

UNKNOWN
0.00 CVSS none

CWE‑502: Deserialization of Untrusted Data vulnerability exists that could cause arbitrary code execution with administrative privileges when a locally authenticated attacker sends a crafted data stream, triggering unsafe deserialization.

Insecure Deserialization
WAF: Medium

CVE-2026-27685

CRITICAL
9.10 CVSS 3.1

SAP NetWeaver Enterprise Portal Administration is vulnerable if a privileged user uploads untrusted or malicious content that, upon deserialization, could result in a high impact on the confidentiality, integrity, and availability of the host system.

Insecure Deserialization
WAF: Medium

CVE-2026-2020

HIGH
7.50 CVSS 3.1

The JS Archive List plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 6.1.7 via the 'included' shortcode attribute. This is due to the deserialization of untrusted input supplied via the 'included' parameter of the plugin's shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.

Insecure Deserialization
WAF: Medium

CVE-2026-28277

UNKNOWN
0.00 CVSS none

LangGraph SQLite Checkpoint is an implementation of LangGraph CheckpointSaver that uses SQLite DB (both sync and async, via aiosqlite). In version 1.0.9 and prior, LangGraph checkpointers can load msgpack-encoded checkpoints that reconstruct Python objects during deserialization. If an attacker can modify checkpoint data in the backing store (for example, after a database compromise or other privileged write access to the persistence layer), they can potentially supply a crafted payload that triggers unsafe object reconstruction when the checkpoint is loaded. No known patch is public.

Insecure Deserialization
WAF: Medium

CVE-2026-27749

HIGH
7.80 CVSS 3.1

Avira Internet Security contains a deserialization of untrusted data vulnerability in the System Speedup component. The Avira.SystemSpeedup.RealTimeOptimizer.exe process, which runs with SYSTEM privileges, deserializes data from a file located in C:\\ProgramData using .NET BinaryFormatter without implementing input validation or deserialization safeguards. Because the file can be created or modified by a local user in default configurations, an attacker can supply a crafted serialized payload that is deserialized by the privileged process, resulting in arbitrary code execution as SYSTEM.

Insecure Deserialization
WAF: Medium

CVE-2026-2599

CRITICAL
9.80 CVSS 3.1

The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.7 via deserialization of untrusted input in the 'download_csv' function. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.

Insecure Deserialization
WAF: Medium

CVE-2026-28105

UNKNOWN
0.00 CVSS none

Deserialization of Untrusted Data vulnerability in ThemeREX Good Energy goodenergy allows Object Injection.This issue affects Good Energy: from n/a through <= 1.7.7.

Insecure Deserialization
WAF: Medium

CVE-2026-28074

UNKNOWN
0.00 CVSS none

Deserialization of Untrusted Data vulnerability in ThemeREX Pizza House pizzahouse allows Object Injection.This issue affects Pizza House: from n/a through <= 1.4.0.

Insecure Deserialization
WAF: Medium

CVE-2026-27439

UNKNOWN
0.00 CVSS none

Deserialization of Untrusted Data vulnerability in ThemeREX Dentario dentario allows Object Injection.This issue affects Dentario: from n/a through <= 1.5.

Insecure Deserialization
WAF: Medium

CVE-2026-27438

UNKNOWN
0.00 CVSS none

Deserialization of Untrusted Data vulnerability in ThemeREX Kingler kingler allows Object Injection.This issue affects Kingler: from n/a through <= 1.7.

Insecure Deserialization
WAF: Medium

CVE-2026-27437

UNKNOWN
0.00 CVSS none

Deserialization of Untrusted Data vulnerability in ThemeREX Tennis Club tennis-sportclub allows Object Injection.This issue affects Tennis Club: from n/a through <= 1.2.3.

Insecure Deserialization
WAF: Medium

CVE-2026-27417

UNKNOWN
0.00 CVSS none

Deserialization of Untrusted Data vulnerability in SeventhQueen Sweet Date sweetdate allows Object Injection.This issue affects Sweet Date: from n/a through < 4.0.1.

Insecure Deserialization
WAF: Medium

CVE-2026-27379

UNKNOWN
0.00 CVSS none

Deserialization of Untrusted Data vulnerability in NextScripts NextScripts social-networks-auto-poster-facebook-twitter-g allows Object Injection.This issue affects NextScripts: from n/a through <= 4.4.7.

Insecure Deserialization
WAF: Medium

CVE-2026-27369

UNKNOWN
0.00 CVSS none

Deserialization of Untrusted Data vulnerability in BoldThemes Celeste celeste allows Object Injection.This issue affects Celeste: from n/a through <= 1.3.6.

Insecure Deserialization
WAF: Medium

CVE-2026-27338

UNKNOWN
0.00 CVSS none

Deserialization of Untrusted Data vulnerability in AivahThemes Car Zone carzone allows Object Injection.This issue affects Car Zone: from n/a through <= 3.7.

Insecure Deserialization
WAF: Medium

CVE-2026-27098

UNKNOWN
0.00 CVSS none

Deserialization of Untrusted Data vulnerability in axiomthemes Au Pair Agency - Babysitting & Nanny Theme au-pair-agency allows Object Injection.This issue affects Au Pair Agency - Babysitting & Nanny Theme: from n/a through <= 1.2.2.

Insecure Deserialization
WAF: Medium

CVE-2026-24385

UNKNOWN
0.00 CVSS none

Deserialization of Untrusted Data vulnerability in gerritvanaaken Podlove Web Player podlove-web-player allows Object Injection.This issue affects Podlove Web Player: from n/a through <= 5.9.1.

Insecure Deserialization
WAF: Medium

CVE-2026-23798

UNKNOWN
0.00 CVSS none

Deserialization of Untrusted Data vulnerability in blubrry PowerPress Podcasting powerpress allows Object Injection.This issue affects PowerPress Podcasting: from n/a through <= 11.15.10.

Insecure Deserialization
WAF: Medium

CVE-2026-22501

UNKNOWN
0.00 CVSS none

Deserialization of Untrusted Data vulnerability in axiomthemes Mounthood mounthood allows Object Injection.This issue affects Mounthood: from n/a through <= 1.3.2.

Insecure Deserialization
WAF: Medium

CVE-2026-22497

UNKNOWN
0.00 CVSS none

Deserialization of Untrusted Data vulnerability in AncoraThemes Jardi jardi allows Object Injection.This issue affects Jardi: from n/a through <= 1.7.2.

Insecure Deserialization
WAF: Medium

CVE-2026-22475

UNKNOWN
0.00 CVSS none

Deserialization of Untrusted Data vulnerability in axiomthemes Estate estate allows Object Injection.This issue affects Estate: from n/a through <= 1.3.4.

Insecure Deserialization
WAF: Medium

CVE-2026-22474

UNKNOWN
0.00 CVSS none

Deserialization of Untrusted Data vulnerability in ThemeREX Equestrian Centre equestrian-centre allows Object Injection.This issue affects Equestrian Centre: from n/a through <= 1.5.

Insecure Deserialization
WAF: Medium

CVE-2026-22473

UNKNOWN
0.00 CVSS none

Deserialization of Untrusted Data vulnerability in designthemes Dental Clinic dental allows Object Injection.This issue affects Dental Clinic: from n/a through <= 3.7.

Insecure Deserialization
WAF: Medium

CVE-2026-22471

UNKNOWN
0.00 CVSS none

Deserialization of Untrusted Data vulnerability in maximsecudeal Secudeal Payments for Ecommerce secudeal-payments-for-ecommerce allows Object Injection.This issue affects Secudeal Payments for Ecommerce: from n/a through <= 1.1.

Insecure Deserialization
WAF: Medium

CVE-2026-22454

UNKNOWN
0.00 CVSS none

Deserialization of Untrusted Data vulnerability in ThemeREX Solaris solaris allows Object Injection.This issue affects Solaris: from n/a through <= 2.5.

Insecure Deserialization
WAF: Medium

CVE-2026-22453

UNKNOWN
0.00 CVSS none

Deserialization of Untrusted Data vulnerability in ThemeREX Pets Club petclub allows Object Injection.This issue affects Pets Club: from n/a through <= 2.3.

Insecure Deserialization
WAF: Medium

CVE-2026-22451

UNKNOWN
0.00 CVSS none

Deserialization of Untrusted Data vulnerability in AncoraThemes Handyman handyman-services allows Object Injection.This issue affects Handyman: from n/a through <= 1.4.

Insecure Deserialization
WAF: Medium
Page 1 of 49 (2433 CVEs)