e107 CMS thru 2.3.3 are vulnerable to insecure deserialization in the `install.php` script. The script processes user-controlled input in the `previous_steps` POST parameter using `unserialize(base64_decode())` without validation, allowing attackers to craft malicious serialized data. This could lead to remote code execution, arbitrary file operations, or denial of service, depending on available PHP object gadgets in the codebase.
Metrics
Affected Vendors & Products
References
History
Fri, 10 Oct 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-502 | |
| Metrics |
cvssV3_1
|
Fri, 10 Oct 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | e107 CMS thru 2.3.3 are vulnerable to insecure deserialization in the `install.php` script. The script processes user-controlled input in the `previous_steps` POST parameter using `unserialize(base64_decode())` without validation, allowing attackers to craft malicious serialized data. This could lead to remote code execution, arbitrary file operations, or denial of service, depending on available PHP object gadgets in the codebase. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-10-10T00:00:00.000Z
Updated: 2025-10-10T19:02:22.126Z
Reserved: 2025-09-26T00:00:00.000Z
Link: CVE-2025-61505
Updated: 2025-10-10T19:02:17.519Z
Status : Awaiting Analysis
Published: 2025-10-10T19:15:38.257
Modified: 2025-10-14T19:36:59.730
Link: CVE-2025-61505
No data.