Skip to main content

CVE-2025-5497: Deserialization in slackero phpwcms

Medium
VulnerabilityCVE-2025-5497cvecve-2025-5497
Published: Tue Jun 03 2025 (06/03/2025, 13:00:16 UTC)
Source: CVE Database V5
Vendor/Project: slackero
Product: phpwcms

Description

A vulnerability was found in slackero phpwcms up to 1.9.45/1.10.8. It has been declared as critical. This vulnerability affects unknown code of the file include/inc_module/mod_feedimport/inc/processing.inc.php of the component Feedimport Module. The manipulation of the argument cnt_text leads to deserialization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.9.46 and 1.10.9 is able to address this issue. It is recommended to upgrade the affected component.

AI-Powered Analysis

AILast updated: 07/11/2025, 07:02:38 UTC

Technical Analysis

CVE-2025-5497 is a medium-severity deserialization vulnerability affecting the slackero phpwcms content management system versions up to 1.9.45 and 1.10.8. The flaw exists in the Feedimport Module, specifically in the file include/inc_module/mod_feedimport/inc/processing.inc.php. The vulnerability arises from improper handling of the cnt_text argument, which is deserialized without sufficient validation or sanitization. This allows an unauthenticated remote attacker to send crafted input to the vulnerable parameter, triggering unsafe deserialization. Unsafe deserialization can lead to arbitrary code execution, data manipulation, or denial of service depending on the payload and the application context. The vulnerability does not require user interaction or authentication, increasing its risk profile. Although the CVSS 4.0 score is 5.3 (medium), the potential impact could be higher if exploited in certain environments. The vendor has released patched versions 1.9.46 and 1.10.9 to address this issue. No known public exploits are currently reported, but the vulnerability details have been disclosed publicly, which may facilitate exploit development. Organizations using affected versions of slackero phpwcms should prioritize upgrading to the fixed versions to mitigate this risk.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on slackero phpwcms for website or content management. Exploitation could lead to unauthorized code execution on web servers, resulting in data breaches, defacement, or service disruption. Confidentiality could be compromised if attackers gain access to sensitive data stored or processed by the CMS. Integrity and availability of web services could also be affected, impacting business operations and reputation. Given the remote and unauthenticated nature of the exploit, attackers can target vulnerable systems at scale. Organizations in sectors such as government, finance, healthcare, and media that use phpwcms may be particularly at risk due to the sensitivity of their data and the criticality of their web presence. Additionally, the public disclosure of the vulnerability increases the urgency for mitigation to prevent opportunistic attacks.

Mitigation Recommendations

1. Immediate upgrade of slackero phpwcms to versions 1.9.46 or 1.10.9, which contain patches for this vulnerability, is the most effective mitigation. 2. If immediate upgrade is not feasible, implement web application firewall (WAF) rules to detect and block suspicious payloads targeting the cnt_text parameter, focusing on serialized data patterns. 3. Conduct thorough input validation and sanitization on all user-supplied data, particularly parameters involved in deserialization processes. 4. Restrict public access to the Feedimport Module or disable it if not in use to reduce the attack surface. 5. Monitor web server logs for unusual requests or anomalies related to the cnt_text parameter. 6. Employ runtime application self-protection (RASP) tools if available to detect and prevent exploitation attempts in real time. 7. Regularly audit and update all third-party components and dependencies to minimize exposure to known vulnerabilities. 8. Educate development and security teams about the risks of unsafe deserialization and secure coding practices to prevent similar issues in the future.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-03T05:14:32.944Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 683f0dc1182aa0cae27ff33e

Added to database: 6/3/2025, 2:59:13 PM

Last enriched: 7/11/2025, 7:02:38 AM

Last updated: 7/30/2025, 4:12:10 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats