CVE-2025-15375: Deserialization in EyouCMS
A flaw has been found in EyouCMS up to 1.7.7. The impacted element is the function unserialize of the file application/api/controller/Ajax.php of the component arcpagelist Handler. Executing manipulation of the argument attstr can lead to deserialization. The attack can be launched remotely. The exploit has been published and may be used. The vendor is "[a]cknowledging the existence of the vulnerability, we have completed the fix and will release a new version, v1.7.8".
AI Analysis
Technical Summary
CVE-2025-15375 is a deserialization vulnerability affecting EyouCMS, a content management system, in versions 1.7.0 through 1.7.7. The flaw resides in the unserialize function within the application/api/controller/Ajax.php file, specifically in the arcpagelist handler component. The vulnerability arises from unsafe deserialization of user-controlled input passed via the 'attstr' argument. Deserialization vulnerabilities can allow attackers to manipulate serialized data to execute arbitrary code, escalate privileges, or cause denial of service. In this case, the attack vector is remote and does not require user interaction, but it does require low-level privileges (PR:L), indicating that some form of authenticated access or limited privilege is necessary to exploit. The CVSS 4.0 score is 5.3 (medium severity), reflecting moderate impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction needed. The vendor has acknowledged the vulnerability and is preparing a patch in version 1.7.8. Although no exploits are currently observed in the wild, published proof-of-concept code increases the risk of exploitation. The vulnerability's exploitation could lead to unauthorized data access, data tampering, or service disruption within affected EyouCMS deployments.
Potential Impact
For European organizations using EyouCMS, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized access to sensitive content, defacement, or disruption of web services, impacting business continuity and reputation. Given EyouCMS's role in managing web content, attacks could compromise customer data or internal information. The requirement for low privileges means that attackers who have gained limited access could escalate their control, increasing the threat level. Organizations in sectors with high reliance on web presence, such as media, education, and government, could face operational and reputational damage. Additionally, the availability of proof-of-concept exploits raises the likelihood of targeted attacks. The medium severity suggests that while the threat is not critical, timely remediation is essential to prevent exploitation, especially in environments with sensitive data or regulatory compliance obligations like GDPR.
Mitigation Recommendations
1. Immediately upgrade EyouCMS installations to version 1.7.8 once released by the vendor to apply the official patch. 2. Until patching is possible, implement strict input validation and sanitization on the 'attstr' parameter to prevent malicious serialized data from being processed. 3. Restrict access to the vulnerable API endpoint (application/api/controller/Ajax.php) using network-level controls such as IP whitelisting or web application firewalls (WAF) with custom rules to detect and block suspicious deserialization payloads. 4. Monitor logs for unusual activity related to the 'attstr' parameter or the arcpagelist handler, including repeated or malformed requests. 5. Employ runtime application self-protection (RASP) or intrusion detection systems (IDS) capable of detecting deserialization attacks. 6. Review and minimize privileges for users and services interacting with the vulnerable component to reduce the attack surface. 7. Conduct security awareness training for administrators to recognize and respond to exploitation attempts. 8. Regularly audit EyouCMS configurations and update all components to the latest secure versions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-15375: Deserialization in EyouCMS
Description
A flaw has been found in EyouCMS up to 1.7.7. The impacted element is the function unserialize of the file application/api/controller/Ajax.php of the component arcpagelist Handler. Executing manipulation of the argument attstr can lead to deserialization. The attack can be launched remotely. The exploit has been published and may be used. The vendor is "[a]cknowledging the existence of the vulnerability, we have completed the fix and will release a new version, v1.7.8".
AI-Powered Analysis
Technical Analysis
CVE-2025-15375 is a deserialization vulnerability affecting EyouCMS, a content management system, in versions 1.7.0 through 1.7.7. The flaw resides in the unserialize function within the application/api/controller/Ajax.php file, specifically in the arcpagelist handler component. The vulnerability arises from unsafe deserialization of user-controlled input passed via the 'attstr' argument. Deserialization vulnerabilities can allow attackers to manipulate serialized data to execute arbitrary code, escalate privileges, or cause denial of service. In this case, the attack vector is remote and does not require user interaction, but it does require low-level privileges (PR:L), indicating that some form of authenticated access or limited privilege is necessary to exploit. The CVSS 4.0 score is 5.3 (medium severity), reflecting moderate impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction needed. The vendor has acknowledged the vulnerability and is preparing a patch in version 1.7.8. Although no exploits are currently observed in the wild, published proof-of-concept code increases the risk of exploitation. The vulnerability's exploitation could lead to unauthorized data access, data tampering, or service disruption within affected EyouCMS deployments.
Potential Impact
For European organizations using EyouCMS, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized access to sensitive content, defacement, or disruption of web services, impacting business continuity and reputation. Given EyouCMS's role in managing web content, attacks could compromise customer data or internal information. The requirement for low privileges means that attackers who have gained limited access could escalate their control, increasing the threat level. Organizations in sectors with high reliance on web presence, such as media, education, and government, could face operational and reputational damage. Additionally, the availability of proof-of-concept exploits raises the likelihood of targeted attacks. The medium severity suggests that while the threat is not critical, timely remediation is essential to prevent exploitation, especially in environments with sensitive data or regulatory compliance obligations like GDPR.
Mitigation Recommendations
1. Immediately upgrade EyouCMS installations to version 1.7.8 once released by the vendor to apply the official patch. 2. Until patching is possible, implement strict input validation and sanitization on the 'attstr' parameter to prevent malicious serialized data from being processed. 3. Restrict access to the vulnerable API endpoint (application/api/controller/Ajax.php) using network-level controls such as IP whitelisting or web application firewalls (WAF) with custom rules to detect and block suspicious deserialization payloads. 4. Monitor logs for unusual activity related to the 'attstr' parameter or the arcpagelist handler, including repeated or malformed requests. 5. Employ runtime application self-protection (RASP) or intrusion detection systems (IDS) capable of detecting deserialization attacks. 6. Review and minimize privileges for users and services interacting with the vulnerable component to reduce the attack surface. 7. Conduct security awareness training for administrators to recognize and respond to exploitation attempts. 8. Regularly audit EyouCMS configurations and update all components to the latest secure versions.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-30T18:46:11.714Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6954b113db813ff03ec76317
Added to database: 12/31/2025, 5:13:55 AM
Last enriched: 12/31/2025, 5:28:50 AM
Last updated: 1/7/2026, 3:50:09 AM
Views: 19
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighCVE-2026-0649: Server-Side Request Forgery in invoiceninja
MediumCVE-2024-14020: Improperly Controlled Modification of Object Prototype Attributes in carboneio carbone
LowCVE-2026-0628: Insufficient policy enforcement in Google Chrome
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.