Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| http://vfront.com |
|
| https://xancatos.org/cve202560641 |
|
Mon, 20 Oct 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vfront
Vfront vfront |
|
| Vendors & Products |
Vfront
Vfront vfront |
Thu, 16 Oct 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-89 | |
| Metrics |
cvssV3_1
|
Thu, 16 Oct 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The file mexcel.php in the Vfront 0.99.52 codebase contains a vulnerable call to unserialize(base64_decode($_POST['mexcel'])), where $_POST['mexcel'] is user-controlled input. This input is decoded from base64 and deserialized without validation or use of the allowed_classes option, allowing an attacker to inject arbitrary PHP objects. This can lead to malicious behavior, such as Remote Code Execution (RCE), SQL Injection, Path Traversal, or Denial of Service, depending on the availability of exploitable classes in the Vfront codebase or its dependencies. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-10-16T19:42:22.484Z
Reserved: 2025-09-26T00:00:00.000Z
Link: CVE-2025-60641
Updated: 2025-10-16T19:42:18.303Z
Status : Awaiting Analysis
Published: 2025-10-16T18:15:37.183
Modified: 2025-10-21T19:31:50.020
Link: CVE-2025-60641
No data.
OpenCVE Enrichment
Updated: 2025-10-20T13:25:09Z