Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34292: CWE-502 Deserialization of Untrusted Data in BeWelcome Rox

0
Critical
VulnerabilityCVE-2025-34292cvecve-2025-34292cwe-502
Published: Mon Oct 27 2025 (10/27/2025, 14:36:52 UTC)
Source: CVE Database V5
Vendor/Project: BeWelcome
Product: Rox

Description

Rox, the software running BeWelcome, contains a PHP object injection vulnerability resulting from deserialization of untrusted data. User-controlled input is passed to PHP's unserialize(): the POST parameter `formkit_memory_recovery` in \\RoxPostHandler::getCallbackAction and the 'memory cookie' read by \\RoxModelBase::getMemoryCookie (bwRemember). (1) If present, `formkit_memory_recovery` is processed and passed to unserialize(), and (2) restore-from-memory functionality calls unserialize() on the bwRemember cookie value. Gadget chains present in Rox and bundled libraries enable exploitation of object injection to write arbitrary files or achieve remote code execution. Successful exploitation can lead to full site compromise. This vulnerability was remediated with commit c60bf04 (2025-06-16).

AI-Powered Analysis

AILast updated: 11/03/2025, 15:12:43 UTC

Technical Analysis

CVE-2025-34292 is a critical vulnerability classified under CWE-502 (Deserialization of Untrusted Data) affecting Rox, the backend software powering BeWelcome, a hospitality exchange platform. The vulnerability stems from unsafe use of PHP's unserialize() function on untrusted inputs: specifically, the POST parameter 'formkit_memory_recovery' handled in RoxPostHandler::getCallbackAction and the 'memory cookie' (bwRemember) processed in RoxModelBase::getMemoryCookie. Both inputs are user-controlled and passed directly to unserialize() without adequate validation or sanitization. This unsafe deserialization enables PHP object injection attacks, where crafted serialized objects exploit existing gadget chains within Rox and its bundled libraries. These gadget chains allow attackers to perform arbitrary file writes or achieve remote code execution (RCE) on the server hosting Rox. The vulnerability requires no authentication or user interaction and can be triggered remotely, making it highly exploitable. The impact includes full site compromise, data theft, defacement, or pivoting within the network. The issue was addressed in a patch committed on June 16, 2025 (commit c60bf04), which presumably removes or secures the unserialize() calls on these inputs. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H) indicates network attack vector, low attack complexity, no user interaction, and high impact on confidentiality, integrity, and availability with scope change, confirming the critical severity.

Potential Impact

For European organizations using BeWelcome’s Rox software, the vulnerability poses a severe risk of complete system compromise. Attackers exploiting this flaw can execute arbitrary code remotely, potentially gaining full control over the web application and underlying server. This can lead to unauthorized access to sensitive user data, disruption of services, defacement, or use of compromised systems as a foothold for further attacks within the organization’s network. Given BeWelcome’s role as a hospitality exchange platform, exposure of personal data and trust erosion among users are significant concerns. The vulnerability’s ease of exploitation and lack of required user interaction increase the likelihood of automated attacks or mass exploitation campaigns. Organizations hosting Rox publicly or integrating it with other services are particularly vulnerable. The impact extends beyond confidentiality to integrity and availability, threatening operational continuity and compliance with European data protection regulations such as GDPR.

Mitigation Recommendations

Organizations should immediately apply the patch from commit c60bf04 released on 2025-06-16 that addresses this vulnerability by securing or removing unsafe unserialize() calls. If patching is not immediately possible, temporarily disable or block the POST parameter 'formkit_memory_recovery' and the processing of the 'memory cookie' (bwRemember) to prevent exploitation. Implement strict input validation and sanitization to ensure no untrusted data reaches unserialize(). Employ web application firewalls (WAFs) with custom rules to detect and block suspicious serialized payloads targeting these parameters. Conduct thorough code audits to identify and refactor any other unsafe deserialization patterns. Monitor logs for anomalous requests involving these inputs and signs of exploitation attempts. Additionally, isolate Rox servers in segmented network zones with minimal privileges to limit potential lateral movement. Regularly update all dependencies and libraries bundled with Rox to reduce gadget chain availability. Finally, educate developers on secure deserialization practices to prevent recurrence.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.581Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ff8744ba6dffc5e2fd65e6

Added to database: 10/27/2025, 2:52:52 PM

Last enriched: 11/3/2025, 3:12:43 PM

Last updated: 12/14/2025, 7:09:06 AM

Views: 163

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats