Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15375: Deserialization in EyouCMS

0
Medium
VulnerabilityCVE-2025-15375cvecve-2025-15375
Published: Wed Dec 31 2025 (12/31/2025, 05:02:09 UTC)
Source: CVE Database V5
Product: EyouCMS

Description

A flaw has been found in EyouCMS up to 1.7.7. The impacted element is the function unserialize of the file application/api/controller/Ajax.php of the component arcpagelist Handler. Executing manipulation of the argument attstr can lead to deserialization. The attack can be launched remotely. The exploit has been published and may be used. The vendor is "[a]cknowledging the existence of the vulnerability, we have completed the fix and will release a new version, v1.7.8".

AI-Powered Analysis

AILast updated: 12/31/2025, 05:28:50 UTC

Technical Analysis

CVE-2025-15375 is a deserialization vulnerability affecting EyouCMS, a content management system, in versions 1.7.0 through 1.7.7. The flaw resides in the unserialize function within the application/api/controller/Ajax.php file, specifically in the arcpagelist handler component. The vulnerability arises from unsafe deserialization of user-controlled input passed via the 'attstr' argument. Deserialization vulnerabilities can allow attackers to manipulate serialized data to execute arbitrary code, escalate privileges, or cause denial of service. In this case, the attack vector is remote and does not require user interaction, but it does require low-level privileges (PR:L), indicating that some form of authenticated access or limited privilege is necessary to exploit. The CVSS 4.0 score is 5.3 (medium severity), reflecting moderate impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction needed. The vendor has acknowledged the vulnerability and is preparing a patch in version 1.7.8. Although no exploits are currently observed in the wild, published proof-of-concept code increases the risk of exploitation. The vulnerability's exploitation could lead to unauthorized data access, data tampering, or service disruption within affected EyouCMS deployments.

Potential Impact

For European organizations using EyouCMS, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized access to sensitive content, defacement, or disruption of web services, impacting business continuity and reputation. Given EyouCMS's role in managing web content, attacks could compromise customer data or internal information. The requirement for low privileges means that attackers who have gained limited access could escalate their control, increasing the threat level. Organizations in sectors with high reliance on web presence, such as media, education, and government, could face operational and reputational damage. Additionally, the availability of proof-of-concept exploits raises the likelihood of targeted attacks. The medium severity suggests that while the threat is not critical, timely remediation is essential to prevent exploitation, especially in environments with sensitive data or regulatory compliance obligations like GDPR.

Mitigation Recommendations

1. Immediately upgrade EyouCMS installations to version 1.7.8 once released by the vendor to apply the official patch. 2. Until patching is possible, implement strict input validation and sanitization on the 'attstr' parameter to prevent malicious serialized data from being processed. 3. Restrict access to the vulnerable API endpoint (application/api/controller/Ajax.php) using network-level controls such as IP whitelisting or web application firewalls (WAF) with custom rules to detect and block suspicious deserialization payloads. 4. Monitor logs for unusual activity related to the 'attstr' parameter or the arcpagelist handler, including repeated or malformed requests. 5. Employ runtime application self-protection (RASP) or intrusion detection systems (IDS) capable of detecting deserialization attacks. 6. Review and minimize privileges for users and services interacting with the vulnerable component to reduce the attack surface. 7. Conduct security awareness training for administrators to recognize and respond to exploitation attempts. 8. Regularly audit EyouCMS configurations and update all components to the latest secure versions.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-30T18:46:11.714Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6954b113db813ff03ec76317

Added to database: 12/31/2025, 5:13:55 AM

Last enriched: 12/31/2025, 5:28:50 AM

Last updated: 1/7/2026, 3:50:09 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats