CVE-2025-34292: CWE-502 Deserialization of Untrusted Data in BeWelcome Rox
Rox, the software running BeWelcome, contains a PHP object injection vulnerability resulting from deserialization of untrusted data. User-controlled input is passed to PHP's unserialize(): the POST parameter `formkit_memory_recovery` in \\RoxPostHandler::getCallbackAction and the 'memory cookie' read by \\RoxModelBase::getMemoryCookie (bwRemember). (1) If present, `formkit_memory_recovery` is processed and passed to unserialize(), and (2) restore-from-memory functionality calls unserialize() on the bwRemember cookie value. Gadget chains present in Rox and bundled libraries enable exploitation of object injection to write arbitrary files or achieve remote code execution. Successful exploitation can lead to full site compromise. This vulnerability was remediated with commit c60bf04 (2025-06-16).
AI Analysis
Technical Summary
CVE-2025-34292 is a critical vulnerability classified under CWE-502 (Deserialization of Untrusted Data) affecting Rox, the backend software for the BeWelcome platform. The flaw stems from the unsafe use of PHP's unserialize() function on user-controllable inputs without proper validation or sanitization. Specifically, the POST parameter 'formkit_memory_recovery' processed by RoxPostHandler::getCallbackAction and the 'memory cookie' (bwRemember) read by RoxModelBase::getMemoryCookie are deserialized directly. This unsafe deserialization enables attackers to leverage existing gadget chains within Rox and its bundled libraries to perform PHP object injection. The consequences include arbitrary file write operations and remote code execution (RCE), which can lead to complete compromise of the web application and underlying server. The vulnerability was introduced in a commit dated January 3, 2025, and was remediated by a patch on June 16, 2025. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the critical nature and ease of exploitation make this a significant threat. Organizations running unpatched versions of Rox should prioritize remediation to prevent potential exploitation.
Potential Impact
For European organizations, the impact of CVE-2025-34292 can be severe. BeWelcome is a social networking platform for travelers, and Rox is its core software, so any organization hosting or relying on this platform could face full site compromise. This could lead to unauthorized data access, data tampering, defacement, or use of compromised servers as pivot points for further attacks within the network. The breach of confidentiality could expose personal user data, violating GDPR and other privacy regulations, resulting in legal and financial repercussions. Integrity loss could undermine trust in the platform, damaging reputation. Availability impacts could disrupt services, affecting user experience and operational continuity. Given the vulnerability allows remote exploitation without authentication or user interaction, attackers can rapidly compromise vulnerable systems at scale. European organizations with public-facing Rox installations or those integrated into critical infrastructure or services are particularly at risk.
Mitigation Recommendations
Organizations should immediately apply the patch released on June 16, 2025, which addresses the unsafe deserialization in Rox. If patching is not immediately possible, implement web application firewall (WAF) rules to block or sanitize requests containing the 'formkit_memory_recovery' POST parameter and the 'bwRemember' cookie. Employ strict input validation and avoid using PHP's unserialize() on untrusted data. Consider disabling or restricting the restore-from-memory functionality if not essential. Conduct thorough code audits to identify and eliminate other unsafe deserialization patterns. Monitor logs for suspicious activity related to these parameters and cookies. Deploy runtime application self-protection (RASP) tools to detect exploitation attempts. Finally, ensure regular backups and incident response plans are in place to recover quickly from potential compromises.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Spain, Italy
CVE-2025-34292: CWE-502 Deserialization of Untrusted Data in BeWelcome Rox
Description
Rox, the software running BeWelcome, contains a PHP object injection vulnerability resulting from deserialization of untrusted data. User-controlled input is passed to PHP's unserialize(): the POST parameter `formkit_memory_recovery` in \\RoxPostHandler::getCallbackAction and the 'memory cookie' read by \\RoxModelBase::getMemoryCookie (bwRemember). (1) If present, `formkit_memory_recovery` is processed and passed to unserialize(), and (2) restore-from-memory functionality calls unserialize() on the bwRemember cookie value. Gadget chains present in Rox and bundled libraries enable exploitation of object injection to write arbitrary files or achieve remote code execution. Successful exploitation can lead to full site compromise. This vulnerability was remediated with commit c60bf04 (2025-06-16).
AI-Powered Analysis
Technical Analysis
CVE-2025-34292 is a critical vulnerability classified under CWE-502 (Deserialization of Untrusted Data) affecting Rox, the backend software for the BeWelcome platform. The flaw stems from the unsafe use of PHP's unserialize() function on user-controllable inputs without proper validation or sanitization. Specifically, the POST parameter 'formkit_memory_recovery' processed by RoxPostHandler::getCallbackAction and the 'memory cookie' (bwRemember) read by RoxModelBase::getMemoryCookie are deserialized directly. This unsafe deserialization enables attackers to leverage existing gadget chains within Rox and its bundled libraries to perform PHP object injection. The consequences include arbitrary file write operations and remote code execution (RCE), which can lead to complete compromise of the web application and underlying server. The vulnerability was introduced in a commit dated January 3, 2025, and was remediated by a patch on June 16, 2025. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the critical nature and ease of exploitation make this a significant threat. Organizations running unpatched versions of Rox should prioritize remediation to prevent potential exploitation.
Potential Impact
For European organizations, the impact of CVE-2025-34292 can be severe. BeWelcome is a social networking platform for travelers, and Rox is its core software, so any organization hosting or relying on this platform could face full site compromise. This could lead to unauthorized data access, data tampering, defacement, or use of compromised servers as pivot points for further attacks within the network. The breach of confidentiality could expose personal user data, violating GDPR and other privacy regulations, resulting in legal and financial repercussions. Integrity loss could undermine trust in the platform, damaging reputation. Availability impacts could disrupt services, affecting user experience and operational continuity. Given the vulnerability allows remote exploitation without authentication or user interaction, attackers can rapidly compromise vulnerable systems at scale. European organizations with public-facing Rox installations or those integrated into critical infrastructure or services are particularly at risk.
Mitigation Recommendations
Organizations should immediately apply the patch released on June 16, 2025, which addresses the unsafe deserialization in Rox. If patching is not immediately possible, implement web application firewall (WAF) rules to block or sanitize requests containing the 'formkit_memory_recovery' POST parameter and the 'bwRemember' cookie. Employ strict input validation and avoid using PHP's unserialize() on untrusted data. Consider disabling or restricting the restore-from-memory functionality if not essential. Conduct thorough code audits to identify and eliminate other unsafe deserialization patterns. Monitor logs for suspicious activity related to these parameters and cookies. Deploy runtime application self-protection (RASP) tools to detect exploitation attempts. Finally, ensure regular backups and incident response plans are in place to recover quickly from potential compromises.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.581Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ff8744ba6dffc5e2fd65e6
Added to database: 10/27/2025, 2:52:52 PM
Last enriched: 10/27/2025, 3:07:45 PM
Last updated: 10/30/2025, 9:26:38 AM
Views: 31
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11906: CWE-732 Incorrect Permission Assignment for Critical Resource in Progress Software Flowmon
MediumCVE-2025-11881: CWE-862 Missing Authorization in scottopolis AppPresser – Mobile App Framework
MediumCVE-2025-62229: Use After Free in Red Hat Red Hat Enterprise Linux 10
HighCVE-2025-11627: CWE-117 Improper Output Neutralization for Logs in sminozzi Site Checkup Debug AI Troubleshooting with Wizard and Tips for Each Issue
MediumCVE-2025-10008: CWE-862 Missing Authorization in remyb92 Translate WordPress and go Multilingual – Weglot
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.