WordPress Falang multilanguage Plugin <= 1.3.65 is vulnerable to a high priority PHP Object Injection

High priority Mitigate with Patchstack
<= 1.3.65Vulnerable version(s)
1.3.66Fixed version
14 Sep, 2025 by Patchstack

Get the fastest vulnerability mitigation with Patchstack!

Get started

Risks

CVSS 8.8

This vulnerability is highly dangerous and expected to become exploited.

User Interaction Required

While this vulnerability can be initiated by the role shown in "Required Privilege", successful exploitation requires a privileged user to perform an action — such as clicking a malicious link, visiting a crafted page, or submitting a form.

8.8

PHP Object Injection

This could allow a malicious actor to execute code injection, SQL injection, path traversal, denial of service, and more if a proper POP chain is present.

CVSS score is a way to evaluate and rank reported vulnerabilities in a standardized and repeatable way but which is not ideal for WordPress.

Solutions

We advise to mitigate or resolve the vulnerability immediately.

Automatically mitigate vulnerabilities and keep your websites safe.

Patchstack has issued a mitigation rule to block any attacks until you have updated to a fixed version.

Get the fastest vulnerability mitigation with Patchstack!

Get started

Update to version 1.3.66 or later.

Update to version 1.3.66 or later to resolve the vulnerability. Patchstack users can turn on auto-update for vulnerable plugins only.

Details

Have additional information or questions about this entry? Let us know.

Timeline

Reported byProfile ImageNguyen Xuan Chien

15 Aug, 2025

Weekly WordPress security intelligence delivered to your inbox.