Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11346: Deserialization in ILIAS

0
Medium
VulnerabilityCVE-2025-11346cvecve-2025-11346
Published: Mon Oct 06 2025 (10/06/2025, 19:32:05 UTC)
Source: CVE Database V5
Product: ILIAS

Description

A vulnerability has been found in ILIAS up to 8.23/9.13/10.1. This affects the function unserialize of the component Base64 Decoding Handler. Such manipulation of the argument f_settings leads to deserialization. It is possible to launch the attack remotely. Upgrading to version 8.24, 9.14 and 10.2 is able to mitigate this issue. It is advisable to upgrade the affected component.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 21:52:58 UTC

Technical Analysis

CVE-2025-11346 identifies a deserialization vulnerability in the ILIAS learning management system affecting versions up to 8.23, 9.13, and 10.1. The vulnerability is located in the Base64 Decoding Handler component, where the PHP function unserialize is called on the f_settings argument without proper validation or sanitization. This unsafe deserialization allows an attacker to craft malicious serialized data that, when processed, can lead to arbitrary code execution or other unintended behaviors. The attack vector is remote and does not require authentication or user interaction, increasing the risk profile. The vulnerability has a CVSS 4.0 score of 5.3, reflecting medium severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is limited but present. No public exploits have been reported yet, but the vulnerability is publicly disclosed and patchable by upgrading to ILIAS versions 8.24, 9.14, or 10.2 where the issue is fixed. The vulnerability underscores the risks of unsafe deserialization in web applications and the importance of input validation and secure coding practices.

Potential Impact

The vulnerability allows remote attackers to exploit unsafe deserialization in ILIAS, potentially leading to partial compromise of system confidentiality, integrity, and availability. Attackers could execute arbitrary code, manipulate application logic, or cause denial of service depending on the payload. Since no authentication or user interaction is required, the attack surface is broad for exposed ILIAS instances. Educational institutions, government agencies, and enterprises using ILIAS for e-learning or content management could face data breaches, unauthorized access, or service disruptions. Although the CVSS score is medium, the ease of exploitation and remote nature make it a significant risk for organizations relying on vulnerable versions. The absence of known exploits in the wild reduces immediate threat but does not eliminate future risk. Failure to patch could lead to targeted attacks, especially in sectors where ILIAS is widely deployed.

Mitigation Recommendations

Organizations should immediately upgrade affected ILIAS installations to versions 8.24, 9.14, or 10.2 where the vulnerability is patched. In addition to upgrading, administrators should audit and restrict network access to ILIAS instances, limiting exposure to trusted networks or VPNs. Implement web application firewalls (WAFs) with rules to detect and block suspicious serialized payloads or unusual Base64 encoded data patterns. Review and harden PHP configurations to disable dangerous functions or limit unserialize usage where possible. Conduct code reviews to identify and remediate other unsafe deserialization patterns. Monitor logs for anomalous activity indicative of exploitation attempts. Employ intrusion detection systems (IDS) to alert on exploitation signatures. Finally, maintain regular backups and incident response plans to recover quickly if compromise occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-06T06:15:37.942Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e41a9cfa9ee2dfa0ac712f

Added to database: 10/6/2025, 7:38:04 PM

Last enriched: 2/24/2026, 9:52:58 PM

Last updated: 3/22/2026, 5:26:11 PM

Views: 216

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses