CVE-2025-34292: CWE-502 Deserialization of Untrusted Data in BeWelcome Rox
Rox, the software running BeWelcome, contains a PHP object injection vulnerability resulting from deserialization of untrusted data. User-controlled input is passed to PHP's unserialize(): the POST parameter `formkit_memory_recovery` in \\RoxPostHandler::getCallbackAction and the 'memory cookie' read by \\RoxModelBase::getMemoryCookie (bwRemember). (1) If present, `formkit_memory_recovery` is processed and passed to unserialize(), and (2) restore-from-memory functionality calls unserialize() on the bwRemember cookie value. Gadget chains present in Rox and bundled libraries enable exploitation of object injection to write arbitrary files or achieve remote code execution. Successful exploitation can lead to full site compromise. This vulnerability was remediated with commit c60bf04 (2025-06-16).
AI Analysis
Technical Summary
CVE-2025-34292 is a critical vulnerability classified under CWE-502 (Deserialization of Untrusted Data) affecting Rox, the backend software powering BeWelcome, a hospitality exchange platform. The vulnerability stems from unsafe use of PHP's unserialize() function on untrusted inputs: specifically, the POST parameter 'formkit_memory_recovery' handled in RoxPostHandler::getCallbackAction and the 'memory cookie' (bwRemember) processed in RoxModelBase::getMemoryCookie. Both inputs are user-controlled and passed directly to unserialize() without adequate validation or sanitization. This unsafe deserialization enables PHP object injection attacks, where crafted serialized objects exploit existing gadget chains within Rox and its bundled libraries. These gadget chains allow attackers to perform arbitrary file writes or achieve remote code execution (RCE) on the server hosting Rox. The vulnerability requires no authentication or user interaction and can be triggered remotely, making it highly exploitable. The impact includes full site compromise, data theft, defacement, or pivoting within the network. The issue was addressed in a patch committed on June 16, 2025 (commit c60bf04), which presumably removes or secures the unserialize() calls on these inputs. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H) indicates network attack vector, low attack complexity, no user interaction, and high impact on confidentiality, integrity, and availability with scope change, confirming the critical severity.
Potential Impact
For European organizations using BeWelcome’s Rox software, the vulnerability poses a severe risk of complete system compromise. Attackers exploiting this flaw can execute arbitrary code remotely, potentially gaining full control over the web application and underlying server. This can lead to unauthorized access to sensitive user data, disruption of services, defacement, or use of compromised systems as a foothold for further attacks within the organization’s network. Given BeWelcome’s role as a hospitality exchange platform, exposure of personal data and trust erosion among users are significant concerns. The vulnerability’s ease of exploitation and lack of required user interaction increase the likelihood of automated attacks or mass exploitation campaigns. Organizations hosting Rox publicly or integrating it with other services are particularly vulnerable. The impact extends beyond confidentiality to integrity and availability, threatening operational continuity and compliance with European data protection regulations such as GDPR.
Mitigation Recommendations
Organizations should immediately apply the patch from commit c60bf04 released on 2025-06-16 that addresses this vulnerability by securing or removing unsafe unserialize() calls. If patching is not immediately possible, temporarily disable or block the POST parameter 'formkit_memory_recovery' and the processing of the 'memory cookie' (bwRemember) to prevent exploitation. Implement strict input validation and sanitization to ensure no untrusted data reaches unserialize(). Employ web application firewalls (WAFs) with custom rules to detect and block suspicious serialized payloads targeting these parameters. Conduct thorough code audits to identify and refactor any other unsafe deserialization patterns. Monitor logs for anomalous requests involving these inputs and signs of exploitation attempts. Additionally, isolate Rox servers in segmented network zones with minimal privileges to limit potential lateral movement. Regularly update all dependencies and libraries bundled with Rox to reduce gadget chain availability. Finally, educate developers on secure deserialization practices to prevent recurrence.
Affected Countries
Germany, France, Netherlands, United Kingdom, Belgium, Sweden
CVE-2025-34292: CWE-502 Deserialization of Untrusted Data in BeWelcome Rox
Description
Rox, the software running BeWelcome, contains a PHP object injection vulnerability resulting from deserialization of untrusted data. User-controlled input is passed to PHP's unserialize(): the POST parameter `formkit_memory_recovery` in \\RoxPostHandler::getCallbackAction and the 'memory cookie' read by \\RoxModelBase::getMemoryCookie (bwRemember). (1) If present, `formkit_memory_recovery` is processed and passed to unserialize(), and (2) restore-from-memory functionality calls unserialize() on the bwRemember cookie value. Gadget chains present in Rox and bundled libraries enable exploitation of object injection to write arbitrary files or achieve remote code execution. Successful exploitation can lead to full site compromise. This vulnerability was remediated with commit c60bf04 (2025-06-16).
AI-Powered Analysis
Technical Analysis
CVE-2025-34292 is a critical vulnerability classified under CWE-502 (Deserialization of Untrusted Data) affecting Rox, the backend software powering BeWelcome, a hospitality exchange platform. The vulnerability stems from unsafe use of PHP's unserialize() function on untrusted inputs: specifically, the POST parameter 'formkit_memory_recovery' handled in RoxPostHandler::getCallbackAction and the 'memory cookie' (bwRemember) processed in RoxModelBase::getMemoryCookie. Both inputs are user-controlled and passed directly to unserialize() without adequate validation or sanitization. This unsafe deserialization enables PHP object injection attacks, where crafted serialized objects exploit existing gadget chains within Rox and its bundled libraries. These gadget chains allow attackers to perform arbitrary file writes or achieve remote code execution (RCE) on the server hosting Rox. The vulnerability requires no authentication or user interaction and can be triggered remotely, making it highly exploitable. The impact includes full site compromise, data theft, defacement, or pivoting within the network. The issue was addressed in a patch committed on June 16, 2025 (commit c60bf04), which presumably removes or secures the unserialize() calls on these inputs. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H) indicates network attack vector, low attack complexity, no user interaction, and high impact on confidentiality, integrity, and availability with scope change, confirming the critical severity.
Potential Impact
For European organizations using BeWelcome’s Rox software, the vulnerability poses a severe risk of complete system compromise. Attackers exploiting this flaw can execute arbitrary code remotely, potentially gaining full control over the web application and underlying server. This can lead to unauthorized access to sensitive user data, disruption of services, defacement, or use of compromised systems as a foothold for further attacks within the organization’s network. Given BeWelcome’s role as a hospitality exchange platform, exposure of personal data and trust erosion among users are significant concerns. The vulnerability’s ease of exploitation and lack of required user interaction increase the likelihood of automated attacks or mass exploitation campaigns. Organizations hosting Rox publicly or integrating it with other services are particularly vulnerable. The impact extends beyond confidentiality to integrity and availability, threatening operational continuity and compliance with European data protection regulations such as GDPR.
Mitigation Recommendations
Organizations should immediately apply the patch from commit c60bf04 released on 2025-06-16 that addresses this vulnerability by securing or removing unsafe unserialize() calls. If patching is not immediately possible, temporarily disable or block the POST parameter 'formkit_memory_recovery' and the processing of the 'memory cookie' (bwRemember) to prevent exploitation. Implement strict input validation and sanitization to ensure no untrusted data reaches unserialize(). Employ web application firewalls (WAFs) with custom rules to detect and block suspicious serialized payloads targeting these parameters. Conduct thorough code audits to identify and refactor any other unsafe deserialization patterns. Monitor logs for anomalous requests involving these inputs and signs of exploitation attempts. Additionally, isolate Rox servers in segmented network zones with minimal privileges to limit potential lateral movement. Regularly update all dependencies and libraries bundled with Rox to reduce gadget chain availability. Finally, educate developers on secure deserialization practices to prevent recurrence.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.581Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ff8744ba6dffc5e2fd65e6
Added to database: 10/27/2025, 2:52:52 PM
Last enriched: 11/3/2025, 3:12:43 PM
Last updated: 12/14/2025, 7:09:06 AM
Views: 163
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14647: SQL Injection in code-projects Computer Book Store
MediumCVE-2025-14646: SQL Injection in code-projects Student File Management System
MediumCVE-2025-12696: CWE-862 Missing Authorization in HelloLeads CRM Form Shortcode
HighCVE-2025-14645: SQL Injection in code-projects Student File Management System
MediumCVE-2025-12537: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpvibes Addon Elements for Elementor (formerly Elementor Addon Elements)
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.