Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15148: Code Injection in CmsEasy

0
Medium
VulnerabilityCVE-2025-15148cvecve-2025-15148
Published: Sun Dec 28 2025 (12/28/2025, 18:02:08 UTC)
Source: CVE Database V5
Product: CmsEasy

Description

A flaw has been found in CmsEasy up to 7.7.7. Affected is the function savetemp_action in the library /lib/admin/template_admin.php of the component Backend Template Management Page. Executing manipulation of the argument content/tempdata can lead to code injection. The attack may be launched remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/30/2025, 23:09:39 UTC

Technical Analysis

CVE-2025-15148 identifies a code injection vulnerability in CmsEasy, a content management system widely used for website backend management. The vulnerability resides in the savetemp_action function located in /lib/admin/template_admin.php, which handles backend template management. Specifically, the flaw allows an attacker to manipulate the content/tempdata parameter to inject and execute arbitrary code on the server. This attack vector is remote and does not require user interaction, but it does require the attacker to have high privileges (PR:H), indicating that some form of authentication or elevated access is necessary before exploitation. The vulnerability impacts confidentiality, integrity, and availability, as arbitrary code execution can lead to data theft, unauthorized changes, or service disruption. The CVSS 4.0 score is 5.1 (medium severity), reflecting the moderate ease of exploitation combined with the privilege requirement and limited scope of impact. The vendor was notified early but did not respond or provide a patch, and no public exploits have been observed in the wild yet. This lack of vendor response increases the risk as organizations must rely on their own mitigations. The vulnerability affects CmsEasy versions 7.7.0 through 7.7.7, which should be considered vulnerable until patched or mitigated. Given the backend nature of the flaw, it is likely to impact administrative users and systems managing website templates, which are critical for site integrity and operation.

Potential Impact

For European organizations, the impact of CVE-2025-15148 can be significant, especially for those relying on CmsEasy for website or content management. Successful exploitation could lead to unauthorized code execution on web servers, allowing attackers to steal sensitive data, deface websites, implant malware, or disrupt services. This could damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR breaches), and cause operational downtime. The requirement for high privileges limits the attack surface but insider threats or compromised credentials could enable exploitation. Sectors such as government, finance, healthcare, and media in Europe that use CmsEasy are particularly vulnerable. Additionally, the lack of vendor response and patches increases exposure time, raising the risk of future exploitation. The medium CVSS score indicates moderate risk, but the potential for code injection elevates the severity of consequences if exploited.

Mitigation Recommendations

European organizations should take immediate steps to mitigate this vulnerability: 1) Restrict access to the backend template management interface to trusted administrators only, ideally via IP whitelisting or VPN. 2) Implement strong authentication and monitor for unusual login activities to prevent privilege escalation or credential compromise. 3) Conduct code audits or apply manual input validation and sanitization on the content/tempdata parameter if possible. 4) Deploy web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the vulnerable function. 5) Monitor logs for anomalous behavior related to template management actions. 6) Engage with the CmsEasy community or security forums for any unofficial patches or workarounds. 7) Prepare incident response plans in case of exploitation. 8) Consider isolating or segmenting the CMS environment to limit lateral movement. Since no official patch is available, these compensating controls are critical until a vendor fix is released.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-27T13:30:04.230Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695450b1db813ff03e2bee23

Added to database: 12/30/2025, 10:22:41 PM

Last enriched: 12/30/2025, 11:09:39 PM

Last updated: 2/2/2026, 8:55:54 AM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Related Threats

CVE-2026-20422: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8668, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8775, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

High
VulnerabilityMon Feb 02 2026

CVE-2026-20421: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8791

High
VulnerabilityMon Feb 02 2026

CVE-2026-20420: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8676, MT8791

High
VulnerabilityMon Feb 02 2026

CVE-2026-20419: CWE-754 Improper Check for Unusual or Exceptional Conditions in MediaTek, Inc. MT6890, MT6989TB, MT7902, MT7915, MT7916, MT7920, MT7921, MT7922, MT7925, MT7927, MT7981, MT7986, MT8196, MT8668, MT8676, MT8678, MT8775, MT8791T, MT8792, MT8793, MT8796, MT8873, MT8883, MT8893, MT8910

High
VulnerabilityMon Feb 02 2026

CVE-2026-20418: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT7931, MT7933

High
VulnerabilityMon Feb 02 2026

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats