e107 CMS thru 2.3.3 are vulnerable to insecure deserialization in the `install.php` script. The script processes user-controlled input in the `previous_steps` POST parameter using `unserialize(base64_decode())` without validation, allowing attackers to craft malicious serialized data. This could lead to remote code execution, arbitrary file operations, or denial of service, depending on available PHP object gadgets in the codebase.
Metrics
Affected Vendors & Products
References
History
Fri, 10 Oct 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-502 | |
Metrics |
cvssV3_1
|
Fri, 10 Oct 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | e107 CMS thru 2.3.3 are vulnerable to insecure deserialization in the `install.php` script. The script processes user-controlled input in the `previous_steps` POST parameter using `unserialize(base64_decode())` without validation, allowing attackers to craft malicious serialized data. This could lead to remote code execution, arbitrary file operations, or denial of service, depending on available PHP object gadgets in the codebase. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-10-10T00:00:00.000Z
Updated: 2025-10-10T19:02:22.126Z
Reserved: 2025-09-26T00:00:00.000Z
Link: CVE-2025-61505

Updated: 2025-10-10T19:02:17.519Z

Status : Received
Published: 2025-10-10T19:15:38.257
Modified: 2025-10-10T19:15:38.257
Link: CVE-2025-61505

No data.