CWE-502: Deserialization of Untrusted Data
The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid.
Yearly Trend
Top Affected Vendors
All Deserialization of Untrusted Data CVEs (1,008)
A deserialization vulnerability in the uxper Nuss WordPress theme allows attackers to inject malicious objects by manipulating serialized data. This a...
Jun 27, 2025CVE-2025-47166 is a deserialization vulnerability in Microsoft Office SharePoint that allows authenticated attackers to execute arbitrary code remotel...
Jun 10, 2025This CVE describes a Java deserialization vulnerability in Apache Kafka Connect that allows authenticated operators with configuration privileges to e...
Jun 10, 2025This vulnerability allows attackers to inject malicious objects through deserialization of untrusted data in the WP Posts Carousel WordPress plugin. S...
Jun 6, 2025This vulnerability in NVIDIA TensorRT-LLM allows attackers with local access to the TRTLLM server to exploit a data validation issue, potentially lead...
May 1, 2025This vulnerability allows attackers to inject malicious objects through deserialization of untrusted data in the Rating by BestWebSoft WordPress plugi...
Apr 17, 2025A deserialization vulnerability in the Stylemix uListing WordPress plugin allows attackers to inject malicious objects by processing untrusted data. T...
Apr 17, 2025A deserialization vulnerability in BizRobo! Management Console allows remote attackers to execute arbitrary code by sending maliciously crafted data. ...
Apr 11, 2025A PHP object injection vulnerability in the Job Board Manager WordPress plugin allows attackers to execute arbitrary code through deserialization of u...
Apr 11, 2025This vulnerability allows attackers to inject malicious objects through deserialization of untrusted data in the WpTravelly WordPress plugin. Successf...
Apr 1, 2025Welcart e-Commerce versions 2.11.6 and earlier contain an untrusted data deserialization vulnerability that allows remote unauthenticated attackers to...
Apr 1, 2025This vulnerability in Jooby's pac4j SessionStoreImpl module allows remote code execution through insecure deserialization of untrusted session data. A...
Mar 31, 2025The ProfileGrid WordPress plugin is vulnerable to PHP object injection via deserialization of untrusted input, allowing authenticated attackers with S...
Mar 22, 2025This vulnerability allows remote code execution (RCE) for domain users in Veeam Backup & Replication. Attackers can execute arbitrary code with domain...
Mar 20, 2025This vulnerability allows remote attackers to execute arbitrary commands on systems running vulnerable versions of binary-husky/gpt_academic by exploi...
Mar 20, 2025This vulnerability allows attackers to inject malicious objects through deserialization of untrusted data in the Booking and Rental Manager WordPress ...
Mar 15, 2025This vulnerability allows attackers to inject malicious objects through deserialization of untrusted data in the Events Calendar for GeoDirectory Word...
Mar 3, 2025IBM Cognos Controller and IBM Controller contain an unrestricted deserialization vulnerability that allows authenticated users to execute arbitrary co...
Feb 19, 2025This vulnerability allows authenticated users to execute arbitrary code on Trimble Cityworks servers via deserialization attacks. It affects organizat...
Feb 6, 2025This vulnerability allows attackers to inject malicious objects through deserialization of untrusted data in the Taxi Booking Manager for WooCommerce ...
Feb 3, 2025This vulnerability allows attackers on the local network to execute arbitrary code on IBM Sterling B2B Integrator systems by exploiting insecure deser...
Jan 22, 2025The String Locator WordPress plugin is vulnerable to PHP object injection through deserialization of untrusted input, allowing unauthenticated attacke...
Jan 21, 2025SuiteCRM 7.12.7 contains an authenticated file upload vulnerability that allows authenticated users to upload malicious files. When combined with inse...
Jan 7, 2025CVE-2024-55555 is an unauthenticated remote code execution vulnerability in Invoice Ninja that allows attackers who know the APP_KEY to execute arbitr...
Jan 7, 2025The UpdraftPlus WordPress backup plugin contains a PHP object injection vulnerability in versions 1.23.8 through 1.24.11. Unauthenticated attackers ca...
Jan 4, 2025The Backup Migration plugin for WordPress is vulnerable to PHP object injection via insecure deserialization, allowing unauthenticated attackers to ex...
Jan 4, 2025This vulnerability allows authenticated remote attackers to execute arbitrary code with SYSTEM privileges on GFI Archiver installations. The flaw exis...
Dec 12, 2024This vulnerability allows low-privileged users without admin or power roles to execute arbitrary code remotely on affected Splunk systems. It affects ...
Dec 10, 2024The Gallery WordPress plugin up to version 1.3 contains a PHP object injection vulnerability via the wd_gallery_$id parameter. This allows authenticat...
Dec 7, 2024This vulnerability allows authenticated WordPress users with Contributor-level access or higher to perform PHP object injection via deserialization of...
Dec 4, 2024This vulnerability allows remote attackers to execute arbitrary code by tricking users into loading malicious model files in Hugging Face Transformers...
Nov 22, 2024This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of Hugging Face Transformers with MobileVi...
Nov 22, 2024This vulnerability allows attackers to inject malicious objects through deserialization of untrusted data in the QRMenu Restaurant QR Menu Lite WordPr...
Nov 20, 2024The WPvivid WordPress plugin is vulnerable to PHP object injection via insecure deserialization in staging site functions. Unauthenticated attackers c...
Nov 14, 2024This vulnerability allows attackers to inject malicious objects through untrusted data deserialization in the WPC Shop as a Customer for WooCommerce W...
Oct 28, 2024This vulnerability allows attackers to inject malicious objects through deserialization of untrusted data in the Free Stock Photos Foter WordPress plu...
Oct 16, 2024In Splunk Enterprise for Windows, low-privileged users without admin or power roles can achieve remote code execution due to insecure session storage....
Oct 14, 2024The Unseen Blog WordPress theme is vulnerable to PHP Object Injection through deserialization of untrusted input. This allows authenticated attackers ...
Oct 1, 2024The UltraPress WordPress theme is vulnerable to PHP object injection through deserialization of untrusted input. This allows authenticated attackers w...
Oct 1, 2024This vulnerability allows authenticated attackers with Author-level WordPress access to perform PHP object injection via deserialization of untrusted ...
Sep 27, 2024This vulnerability allows authorized attackers to execute arbitrary code on Apache HertzBeat servers by exploiting insecure deserialization in SnakeYa...
Sep 21, 2024CVE-2024-45852 is a deserialization vulnerability in MindsDB that allows remote code execution when malicious models are uploaded. Attackers can execu...
Sep 12, 2024This vulnerability allows remote attackers to execute arbitrary code on Microsoft SharePoint Server by exploiting insecure deserialization. It affects...
Sep 10, 2024This vulnerability allows remote code execution through unsafe YAML deserialization in the Kubernetes plugin of the Samson deployment tool. Attackers ...
Aug 20, 2024The Flipbox Builder WordPress plugin is vulnerable to PHP Object Injection via insecure deserialization, allowing authenticated attackers with Contrib...
Jul 27, 2024This vulnerability allows authenticated attackers to execute arbitrary code on Apache Linkis servers by exploiting Java deserialization when adding My...
Jul 15, 2024The Photo Video Gallery Master WordPress plugin is vulnerable to PHP object injection via deserialization of untrusted input in the 'PVGM_all_photos_d...
Jun 19, 2024This vulnerability allows remote code execution through insecure deserialization in NukeViet and NukeViet-eGov admin interfaces. Attackers can exploit...
Jun 10, 2024This vulnerability in MLflow allows remote code execution when users interact with maliciously uploaded Langchain AgentExecutor models. Attackers can ...
Jun 4, 2024This vulnerability in MLflow allows remote code execution when deserializing untrusted data from malicious Recipes. It affects MLflow versions 1.27.0 ...
Jun 4, 2024About Deserialization of Untrusted Data (CWE-502)
The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid.
Our database tracks 1,008 CVEs classified as CWE-502, with 491 rated critical and 461 rated high severity. The average CVSS score for Deserialization of Untrusted Data vulnerabilities is 8.8.
External reference: View CWE-502 on MITRE CWE →
Monitor Deserialization of Untrusted Data Vulnerabilities
Get alerted when new Deserialization of Untrusted Data CVEs affect your infrastructure.
Start Monitoring Free