CVE-2025-5498: Deserialization in slackero phpwcms
A vulnerability was found in slackero phpwcms up to 1.9.45/1.10.8. It has been rated as critical. This issue affects the function file_get_contents/is_file of the file include/inc_lib/content/cnt21.readform.inc.php of the component Custom Source Tab. The manipulation of the argument cpage_custom leads to deserialization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.9.46 and 1.10.9 is able to address this issue. It is recommended to upgrade the affected component.
AI Analysis
Technical Summary
CVE-2025-5498 is a deserialization vulnerability identified in slackero phpwcms versions up to 1.9.45 and 1.10.8. The flaw exists in the Custom Source Tab component, specifically within the file include/inc_lib/content/cnt21.readform.inc.php, affecting the functions file_get_contents and is_file. The vulnerability arises from improper handling of the 'cpage_custom' argument, which can be manipulated to trigger unsafe deserialization of user-supplied data. This deserialization flaw allows an attacker to remotely execute arbitrary code or manipulate application logic without authentication, as the attack vector is network accessible and does not require privileges. The vulnerability has a CVSS 4.0 score of 5.1, indicating medium severity, with an attack vector of network, low attack complexity, no privileges required, but requiring user interaction. The impact on confidentiality, integrity, and availability is low, but the exploitability is facilitated by the lack of authentication and network accessibility. Although no known exploits are currently observed in the wild, the public disclosure of the exploit increases the risk of exploitation. The vendor has addressed the issue in versions 1.9.46 and 1.10.9, and upgrading to these or later versions is recommended to remediate the vulnerability.
Potential Impact
For European organizations using slackero phpwcms, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized code execution or manipulation of content management functions, potentially compromising website integrity and availability. While the confidentiality impact is low, attackers could deface websites, inject malicious content, or disrupt services, affecting business reputation and user trust. Organizations in sectors relying heavily on web presence, such as e-commerce, media, and government services, may experience operational disruptions. The medium severity and requirement for user interaction somewhat limit the threat scope; however, the remote exploitability and public availability of the exploit code increase the urgency for mitigation. Failure to patch could lead to targeted attacks exploiting this vulnerability, especially in environments where phpwcms is used without additional security controls.
Mitigation Recommendations
Beyond upgrading to phpwcms versions 1.9.46 or 1.10.9, organizations should implement several practical measures: 1) Conduct a thorough inventory of phpwcms instances to identify affected versions. 2) Apply strict input validation and sanitization on all user-supplied parameters, especially those related to 'cpage_custom', to prevent malicious payloads from reaching deserialization routines. 3) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious deserialization patterns or anomalous requests targeting the vulnerable endpoint. 4) Monitor logs for unusual activity related to the Custom Source Tab component and file_get_contents/is_file function calls. 5) Restrict access to the vulnerable component by IP whitelisting or network segmentation where feasible. 6) Implement runtime application self-protection (RASP) solutions to detect and prevent exploitation attempts in real time. 7) Educate development and security teams about secure deserialization practices to avoid similar vulnerabilities in custom code.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-5498: Deserialization in slackero phpwcms
Description
A vulnerability was found in slackero phpwcms up to 1.9.45/1.10.8. It has been rated as critical. This issue affects the function file_get_contents/is_file of the file include/inc_lib/content/cnt21.readform.inc.php of the component Custom Source Tab. The manipulation of the argument cpage_custom leads to deserialization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.9.46 and 1.10.9 is able to address this issue. It is recommended to upgrade the affected component.
AI-Powered Analysis
Technical Analysis
CVE-2025-5498 is a deserialization vulnerability identified in slackero phpwcms versions up to 1.9.45 and 1.10.8. The flaw exists in the Custom Source Tab component, specifically within the file include/inc_lib/content/cnt21.readform.inc.php, affecting the functions file_get_contents and is_file. The vulnerability arises from improper handling of the 'cpage_custom' argument, which can be manipulated to trigger unsafe deserialization of user-supplied data. This deserialization flaw allows an attacker to remotely execute arbitrary code or manipulate application logic without authentication, as the attack vector is network accessible and does not require privileges. The vulnerability has a CVSS 4.0 score of 5.1, indicating medium severity, with an attack vector of network, low attack complexity, no privileges required, but requiring user interaction. The impact on confidentiality, integrity, and availability is low, but the exploitability is facilitated by the lack of authentication and network accessibility. Although no known exploits are currently observed in the wild, the public disclosure of the exploit increases the risk of exploitation. The vendor has addressed the issue in versions 1.9.46 and 1.10.9, and upgrading to these or later versions is recommended to remediate the vulnerability.
Potential Impact
For European organizations using slackero phpwcms, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized code execution or manipulation of content management functions, potentially compromising website integrity and availability. While the confidentiality impact is low, attackers could deface websites, inject malicious content, or disrupt services, affecting business reputation and user trust. Organizations in sectors relying heavily on web presence, such as e-commerce, media, and government services, may experience operational disruptions. The medium severity and requirement for user interaction somewhat limit the threat scope; however, the remote exploitability and public availability of the exploit code increase the urgency for mitigation. Failure to patch could lead to targeted attacks exploiting this vulnerability, especially in environments where phpwcms is used without additional security controls.
Mitigation Recommendations
Beyond upgrading to phpwcms versions 1.9.46 or 1.10.9, organizations should implement several practical measures: 1) Conduct a thorough inventory of phpwcms instances to identify affected versions. 2) Apply strict input validation and sanitization on all user-supplied parameters, especially those related to 'cpage_custom', to prevent malicious payloads from reaching deserialization routines. 3) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious deserialization patterns or anomalous requests targeting the vulnerable endpoint. 4) Monitor logs for unusual activity related to the Custom Source Tab component and file_get_contents/is_file function calls. 5) Restrict access to the vulnerable component by IP whitelisting or network segmentation where feasible. 6) Implement runtime application self-protection (RASP) solutions to detect and prevent exploitation attempts in real time. 7) Educate development and security teams about secure deserialization practices to avoid similar vulnerabilities in custom code.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-03T05:14:35.178Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 683efc06182aa0cae27d3674
Added to database: 6/3/2025, 1:43:34 PM
Last enriched: 7/11/2025, 7:04:35 AM
Last updated: 8/3/2025, 4:26:58 PM
Views: 10
Related Threats
CVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8142: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pencidesign Soledad
HighCVE-2025-8105: CWE-94 Improper Control of Generation of Code ('Code Injection') in pencidesign Soledad
HighCVE-2025-8719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.