CVE-2025-30973
Lifecycle Timeline
2Description
Deserialization of Untrusted Data vulnerability in Codexpert, Inc CoSchool LMS coschool allows Object Injection.This issue affects CoSchool LMS: from n/a through <= 1.4.3.
Analysis
Deserialization of untrusted data in Codexpert Inc's CoSchool LMS WordPress plugin through version 1.4.3 enables PHP object injection attacks, potentially allowing remote code execution or arbitrary action execution by unauthenticated attackers. EPSS score of 0.13% (33rd percentile) indicates low measured exploitation probability at time of analysis, with no confirmed active exploitation or public exploit code identified.
Technical Context
CoSchool LMS implements unsafe PHP object deserialization (CWE-502) that accepts untrusted serialized data without proper validation. This vulnerability class typically occurs when applications use PHP's unserialize() function on user-supplied input, allowing attackers to instantiate arbitrary classes and trigger magic methods (__wakeup, __toString, __call, etc.) to achieve object injection. The affected WordPress plugin processes this data without sufficient input sanitization, creating a gadget chain opportunity where existing PHP classes in the WordPress/plugin ecosystem can be chained to achieve code execution or privilege escalation.
Affected Products
Codexpert Inc CoSchool LMS WordPress plugin through version 1.4.3 is affected. The vulnerability impacts all installations running CoSchool LMS from an unspecified baseline through 1.4.3 inclusive.
Remediation
Update CoSchool LMS plugin to version 1.4.4 or later as released by Codexpert Inc. Users should immediately apply the patched version through the WordPress plugin management interface. As interim mitigation pending patching, restrict plugin access via WordPress security hardening (disable REST API endpoints if unused, implement WAF rules to block serialized object patterns in requests), though patching remains the primary recommended remediation. Refer to https://patchstack.com/database/Wordpress/Plugin/coschool/vulnerability/wordpress-coschool-lms-1-4-3-php-object-injection-vulnerability for vendor advisory details.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today