CVE-2025-11138: OS Command Injection in mirweiye wenkucms
A vulnerability was found in mirweiye wenkucms up to 3.4. This impacts the function createPathOne of the file app/common/common.php. The manipulation results in os command injection. The attack may be launched remotely. The exploit has been made public and could be used.
AI Analysis
Technical Summary
CVE-2025-11138 is a security vulnerability identified in the mirweiye wenkucms content management system, specifically affecting versions 3.0 through 3.4. The vulnerability resides in the function createPathOne within the file app/common/common.php. This flaw allows an attacker to perform OS command injection by manipulating input parameters that are not properly sanitized before being passed to system-level commands. The vulnerability can be exploited remotely without requiring user interaction or prior authentication, making it accessible to unauthenticated attackers over the network. The CVSS 4.0 base score is 5.3 (medium severity), reflecting that the attack vector is network-based with low attack complexity and no user interaction needed, but requiring low privileges. The impact on confidentiality, integrity, and availability is limited but present, as the vulnerability allows partial control over OS commands, potentially enabling attackers to execute arbitrary commands with the privileges of the application. Although no public exploits are currently known in the wild, the exploit code has been made public, increasing the risk of exploitation. The vulnerability does not involve scope change or security controls bypass, but the partial impact on confidentiality and integrity could lead to unauthorized data access or modification, and availability could be affected if commands disrupt service. The lack of official patches at the time of publication increases the urgency for mitigation.
Potential Impact
For European organizations using mirweiye wenkucms versions 3.0 to 3.4, this vulnerability poses a moderate risk. Successful exploitation could allow attackers to execute arbitrary OS commands remotely, potentially leading to unauthorized access to sensitive data, modification or deletion of files, or disruption of CMS availability. This could impact organizations relying on wenkucms for web content management, including educational institutions, small to medium enterprises, and niche service providers. The medium severity indicates that while the threat is not critical, it can still lead to significant operational and reputational damage if exploited. Given the remote exploitability and no need for user interaction, attackers could automate attacks, increasing the risk of widespread compromise. European organizations with limited security monitoring or outdated CMS instances are particularly vulnerable. Additionally, the presence of publicly available exploit code lowers the barrier for attackers, increasing the likelihood of targeted attacks or opportunistic scanning by threat actors.
Mitigation Recommendations
1. Immediate upgrade: Organizations should verify their wenkucms version and upgrade to a version beyond 3.4 once a patch is released by the vendor. Until then, consider disabling or restricting access to the vulnerable function if possible. 2. Input validation: Implement strict input validation and sanitization on all user-supplied data that interacts with system commands, especially within createPathOne or similar functions. 3. Network restrictions: Restrict external network access to the CMS administration interfaces and related endpoints using firewalls or access control lists to limit exposure. 4. Application sandboxing: Run the CMS with the least privilege necessary, ensuring the application user has minimal OS permissions to limit the impact of command injection. 5. Monitoring and detection: Deploy host-based intrusion detection systems and web application firewalls configured to detect suspicious command injection patterns. Monitor logs for unusual command execution or errors related to createPathOne. 6. Incident response readiness: Prepare response plans to quickly isolate and remediate affected systems if exploitation is detected. 7. Vendor communication: Stay in contact with mirweiye for official patches and advisories, and apply updates promptly once available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-11138: OS Command Injection in mirweiye wenkucms
Description
A vulnerability was found in mirweiye wenkucms up to 3.4. This impacts the function createPathOne of the file app/common/common.php. The manipulation results in os command injection. The attack may be launched remotely. The exploit has been made public and could be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-11138 is a security vulnerability identified in the mirweiye wenkucms content management system, specifically affecting versions 3.0 through 3.4. The vulnerability resides in the function createPathOne within the file app/common/common.php. This flaw allows an attacker to perform OS command injection by manipulating input parameters that are not properly sanitized before being passed to system-level commands. The vulnerability can be exploited remotely without requiring user interaction or prior authentication, making it accessible to unauthenticated attackers over the network. The CVSS 4.0 base score is 5.3 (medium severity), reflecting that the attack vector is network-based with low attack complexity and no user interaction needed, but requiring low privileges. The impact on confidentiality, integrity, and availability is limited but present, as the vulnerability allows partial control over OS commands, potentially enabling attackers to execute arbitrary commands with the privileges of the application. Although no public exploits are currently known in the wild, the exploit code has been made public, increasing the risk of exploitation. The vulnerability does not involve scope change or security controls bypass, but the partial impact on confidentiality and integrity could lead to unauthorized data access or modification, and availability could be affected if commands disrupt service. The lack of official patches at the time of publication increases the urgency for mitigation.
Potential Impact
For European organizations using mirweiye wenkucms versions 3.0 to 3.4, this vulnerability poses a moderate risk. Successful exploitation could allow attackers to execute arbitrary OS commands remotely, potentially leading to unauthorized access to sensitive data, modification or deletion of files, or disruption of CMS availability. This could impact organizations relying on wenkucms for web content management, including educational institutions, small to medium enterprises, and niche service providers. The medium severity indicates that while the threat is not critical, it can still lead to significant operational and reputational damage if exploited. Given the remote exploitability and no need for user interaction, attackers could automate attacks, increasing the risk of widespread compromise. European organizations with limited security monitoring or outdated CMS instances are particularly vulnerable. Additionally, the presence of publicly available exploit code lowers the barrier for attackers, increasing the likelihood of targeted attacks or opportunistic scanning by threat actors.
Mitigation Recommendations
1. Immediate upgrade: Organizations should verify their wenkucms version and upgrade to a version beyond 3.4 once a patch is released by the vendor. Until then, consider disabling or restricting access to the vulnerable function if possible. 2. Input validation: Implement strict input validation and sanitization on all user-supplied data that interacts with system commands, especially within createPathOne or similar functions. 3. Network restrictions: Restrict external network access to the CMS administration interfaces and related endpoints using firewalls or access control lists to limit exposure. 4. Application sandboxing: Run the CMS with the least privilege necessary, ensuring the application user has minimal OS permissions to limit the impact of command injection. 5. Monitoring and detection: Deploy host-based intrusion detection systems and web application firewalls configured to detect suspicious command injection patterns. Monitor logs for unusual command execution or errors related to createPathOne. 6. Incident response readiness: Prepare response plans to quickly isolate and remediate affected systems if exploitation is detected. 7. Vendor communication: Stay in contact with mirweiye for official patches and advisories, and apply updates promptly once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-28T18:34:50.722Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d9fa5349cfd472f58152b6
Added to database: 9/29/2025, 3:17:39 AM
Last enriched: 9/29/2025, 3:32:47 AM
Last updated: 9/29/2025, 5:08:37 AM
Views: 7
Related Threats
CVE-2025-11140: XML External Entity Reference in Bjskzy Zhiyou ERP
MediumCVE-2025-11139: Path Traversal in Bjskzy Zhiyou ERP
MediumCVE-2025-11136: Unrestricted Upload in YiFang CMS
MediumCVE-2025-11135: Deserialization in pmTicket Project-Management-Software
MediumCVE-2025-9904: CWE-696: Incorrect Behavior Order in Canon Inc. Generic Plus PCL6 Printer Driver
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.