Description
It was determined that your web application is performing Python object deserialization (using the pickle library) of user-supplied data. Arbitrary object deserialization is inherently unsafe, and should never be performed on untrusted data. Consult Web references section for more information about this issue.
Remediation
The pickle module is not intended to be secure against erroneous or maliciously constructed data. Never unpickle data received from an untrusted or unauthenticated source.
References
Related Vulnerabilities
WordPress Plugin PHP Everywhere Multiple Remote Code Execution Vulnerabilities (2.0.3)
WordPress Plugin Jekyll Exporter Remote Code Execution (2.2.0)
Missing Authentication Check in SAP Solution Manager
WordPress Plugin Spreadsheet (wpSS) SQL Injection (0.62)
WordPress Plugin Spam protection, AntiSpam, FireWall by CleanTalk SQL Injection (5.185)