CVE-2025-30973

2025-07-16 [email protected]

Lifecycle Timeline

2
Analysis Generated
Apr 01, 2026 - 17:26 vuln.today
CVE Published
Jul 16, 2025 - 12:15 nvd
N/A

Description

Deserialization of Untrusted Data vulnerability in Codexpert, Inc CoSchool LMS coschool allows Object Injection.This issue affects CoSchool LMS: from n/a through <= 1.4.3.

Analysis

Deserialization of untrusted data in Codexpert Inc's CoSchool LMS WordPress plugin through version 1.4.3 enables PHP object injection attacks, potentially allowing remote code execution or arbitrary action execution by unauthenticated attackers. EPSS score of 0.13% (33rd percentile) indicates low measured exploitation probability at time of analysis, with no confirmed active exploitation or public exploit code identified.

Technical Context

CoSchool LMS implements unsafe PHP object deserialization (CWE-502) that accepts untrusted serialized data without proper validation. This vulnerability class typically occurs when applications use PHP's unserialize() function on user-supplied input, allowing attackers to instantiate arbitrary classes and trigger magic methods (__wakeup, __toString, __call, etc.) to achieve object injection. The affected WordPress plugin processes this data without sufficient input sanitization, creating a gadget chain opportunity where existing PHP classes in the WordPress/plugin ecosystem can be chained to achieve code execution or privilege escalation.

Affected Products

Codexpert Inc CoSchool LMS WordPress plugin through version 1.4.3 is affected. The vulnerability impacts all installations running CoSchool LMS from an unspecified baseline through 1.4.3 inclusive.

Remediation

Update CoSchool LMS plugin to version 1.4.4 or later as released by Codexpert Inc. Users should immediately apply the patched version through the WordPress plugin management interface. As interim mitigation pending patching, restrict plugin access via WordPress security hardening (disable REST API endpoints if unused, implement WAF rules to block serialized object patterns in requests), though patching remains the primary recommended remediation. Refer to https://patchstack.com/database/Wordpress/Plugin/coschool/vulnerability/wordpress-coschool-lms-1-4-3-php-object-injection-vulnerability for vendor advisory details.

Priority Score

0
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +0
POC: 0

Share

CVE-2025-30973 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy