CVE-2025-5498: Deserialization in slackero phpwcms
A vulnerability was found in slackero phpwcms up to 1.9.45/1.10.8. It has been rated as critical. This issue affects the function file_get_contents/is_file of the file include/inc_lib/content/cnt21.readform.inc.php of the component Custom Source Tab. The manipulation of the argument cpage_custom leads to deserialization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.9.46 and 1.10.9 is able to address this issue. It is recommended to upgrade the affected component.
AI Analysis
Technical Summary
CVE-2025-5498 is a deserialization vulnerability identified in slackero phpwcms versions up to 1.9.45 and 1.10.8. The flaw exists in the Custom Source Tab component, specifically within the file include/inc_lib/content/cnt21.readform.inc.php, affecting the functions file_get_contents and is_file. The vulnerability arises from improper handling of the 'cpage_custom' argument, which can be manipulated to trigger unsafe deserialization of user-supplied data. This deserialization flaw allows an attacker to remotely execute arbitrary code or manipulate application logic without authentication, as the attack vector is network accessible and does not require privileges. The vulnerability has a CVSS 4.0 score of 5.1, indicating medium severity, with an attack vector of network, low attack complexity, no privileges required, but requiring user interaction. The impact on confidentiality, integrity, and availability is low, but the exploitability is facilitated by the lack of authentication and network accessibility. Although no known exploits are currently observed in the wild, the public disclosure of the exploit increases the risk of exploitation. The vendor has addressed the issue in versions 1.9.46 and 1.10.9, and upgrading to these or later versions is recommended to remediate the vulnerability.
Potential Impact
For European organizations using slackero phpwcms, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized code execution or manipulation of content management functions, potentially compromising website integrity and availability. While the confidentiality impact is low, attackers could deface websites, inject malicious content, or disrupt services, affecting business reputation and user trust. Organizations in sectors relying heavily on web presence, such as e-commerce, media, and government services, may experience operational disruptions. The medium severity and requirement for user interaction somewhat limit the threat scope; however, the remote exploitability and public availability of the exploit code increase the urgency for mitigation. Failure to patch could lead to targeted attacks exploiting this vulnerability, especially in environments where phpwcms is used without additional security controls.
Mitigation Recommendations
Beyond upgrading to phpwcms versions 1.9.46 or 1.10.9, organizations should implement several practical measures: 1) Conduct a thorough inventory of phpwcms instances to identify affected versions. 2) Apply strict input validation and sanitization on all user-supplied parameters, especially those related to 'cpage_custom', to prevent malicious payloads from reaching deserialization routines. 3) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious deserialization patterns or anomalous requests targeting the vulnerable endpoint. 4) Monitor logs for unusual activity related to the Custom Source Tab component and file_get_contents/is_file function calls. 5) Restrict access to the vulnerable component by IP whitelisting or network segmentation where feasible. 6) Implement runtime application self-protection (RASP) solutions to detect and prevent exploitation attempts in real time. 7) Educate development and security teams about secure deserialization practices to avoid similar vulnerabilities in custom code.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-5498: Deserialization in slackero phpwcms
Description
A vulnerability was found in slackero phpwcms up to 1.9.45/1.10.8. It has been rated as critical. This issue affects the function file_get_contents/is_file of the file include/inc_lib/content/cnt21.readform.inc.php of the component Custom Source Tab. The manipulation of the argument cpage_custom leads to deserialization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.9.46 and 1.10.9 is able to address this issue. It is recommended to upgrade the affected component.
AI-Powered Analysis
Technical Analysis
CVE-2025-5498 is a deserialization vulnerability identified in slackero phpwcms versions up to 1.9.45 and 1.10.8. The flaw exists in the Custom Source Tab component, specifically within the file include/inc_lib/content/cnt21.readform.inc.php, affecting the functions file_get_contents and is_file. The vulnerability arises from improper handling of the 'cpage_custom' argument, which can be manipulated to trigger unsafe deserialization of user-supplied data. This deserialization flaw allows an attacker to remotely execute arbitrary code or manipulate application logic without authentication, as the attack vector is network accessible and does not require privileges. The vulnerability has a CVSS 4.0 score of 5.1, indicating medium severity, with an attack vector of network, low attack complexity, no privileges required, but requiring user interaction. The impact on confidentiality, integrity, and availability is low, but the exploitability is facilitated by the lack of authentication and network accessibility. Although no known exploits are currently observed in the wild, the public disclosure of the exploit increases the risk of exploitation. The vendor has addressed the issue in versions 1.9.46 and 1.10.9, and upgrading to these or later versions is recommended to remediate the vulnerability.
Potential Impact
For European organizations using slackero phpwcms, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized code execution or manipulation of content management functions, potentially compromising website integrity and availability. While the confidentiality impact is low, attackers could deface websites, inject malicious content, or disrupt services, affecting business reputation and user trust. Organizations in sectors relying heavily on web presence, such as e-commerce, media, and government services, may experience operational disruptions. The medium severity and requirement for user interaction somewhat limit the threat scope; however, the remote exploitability and public availability of the exploit code increase the urgency for mitigation. Failure to patch could lead to targeted attacks exploiting this vulnerability, especially in environments where phpwcms is used without additional security controls.
Mitigation Recommendations
Beyond upgrading to phpwcms versions 1.9.46 or 1.10.9, organizations should implement several practical measures: 1) Conduct a thorough inventory of phpwcms instances to identify affected versions. 2) Apply strict input validation and sanitization on all user-supplied parameters, especially those related to 'cpage_custom', to prevent malicious payloads from reaching deserialization routines. 3) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious deserialization patterns or anomalous requests targeting the vulnerable endpoint. 4) Monitor logs for unusual activity related to the Custom Source Tab component and file_get_contents/is_file function calls. 5) Restrict access to the vulnerable component by IP whitelisting or network segmentation where feasible. 6) Implement runtime application self-protection (RASP) solutions to detect and prevent exploitation attempts in real time. 7) Educate development and security teams about secure deserialization practices to avoid similar vulnerabilities in custom code.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-03T05:14:35.178Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 683efc06182aa0cae27d3674
Added to database: 6/3/2025, 1:43:34 PM
Last enriched: 7/11/2025, 7:04:35 AM
Last updated: 9/27/2025, 3:00:19 AM
Views: 16
Related Threats
CVE-2025-9952: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in sergiotrinity Trinity Audio – Text to Speech AI audio player to convert content into audio
MediumCVE-2025-9886: CWE-352 Cross-Site Request Forgery (CSRF) in sergiotrinity Trinity Audio – Text to Speech AI audio player to convert content into audio
MediumCVE-2025-10383: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in contest-gallery Contest Gallery – Upload, Vote & Sell with PayPal and Stripe
MediumCVE-2025-61895
LowCVE-2025-61894
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.