e107 CMS thru 2.3.3 are vulnerable to insecure deserialization in the `install.php` script. The script processes user-controlled input in the `previous_steps` POST parameter using `unserialize(base64_decode())` without validation, allowing attackers to craft malicious serialized data. This could lead to remote code execution, arbitrary file operations, or denial of service, depending on available PHP object gadgets in the codebase.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 10 Oct 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-502 | |
Metrics |
cvssV3_1
|
Fri, 10 Oct 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | e107 CMS thru 2.3.3 are vulnerable to insecure deserialization in the `install.php` script. The script processes user-controlled input in the `previous_steps` POST parameter using `unserialize(base64_decode())` without validation, allowing attackers to craft malicious serialized data. This could lead to remote code execution, arbitrary file operations, or denial of service, depending on available PHP object gadgets in the codebase. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-10-10T19:02:22.126Z
Reserved: 2025-09-26T00:00:00.000Z
Link: CVE-2025-61505

Updated: 2025-10-10T19:02:17.519Z

Status : Received
Published: 2025-10-10T19:15:38.257
Modified: 2025-10-10T19:15:38.257
Link: CVE-2025-61505

No data.

No data.