CVE-2025-5498: Deserialization in slackero phpwcms
A vulnerability was found in slackero phpwcms up to 1.9.45/1.10.8. It has been rated as critical. This issue affects the function file_get_contents/is_file of the file include/inc_lib/content/cnt21.readform.inc.php of the component Custom Source Tab. The manipulation of the argument cpage_custom leads to deserialization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.9.46 and 1.10.9 is able to address this issue. It is recommended to upgrade the affected component.
AI Analysis
Technical Summary
CVE-2025-5498 is a deserialization vulnerability identified in slackero phpwcms versions up to 1.9.45 and 1.10.8. The flaw exists in the Custom Source Tab component, specifically within the file include/inc_lib/content/cnt21.readform.inc.php, affecting the functions file_get_contents and is_file. The vulnerability arises from improper handling of the 'cpage_custom' argument, which can be manipulated to trigger unsafe deserialization of user-supplied data. This deserialization flaw allows an attacker to remotely execute arbitrary code or manipulate application logic without authentication, as the attack vector is network accessible and does not require privileges. The vulnerability has a CVSS 4.0 score of 5.1, indicating medium severity, with an attack vector of network, low attack complexity, no privileges required, but requiring user interaction. The impact on confidentiality, integrity, and availability is low, but the exploitability is facilitated by the lack of authentication and network accessibility. Although no known exploits are currently observed in the wild, the public disclosure of the exploit increases the risk of exploitation. The vendor has addressed the issue in versions 1.9.46 and 1.10.9, and upgrading to these or later versions is recommended to remediate the vulnerability.
Potential Impact
For European organizations using slackero phpwcms, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized code execution or manipulation of content management functions, potentially compromising website integrity and availability. While the confidentiality impact is low, attackers could deface websites, inject malicious content, or disrupt services, affecting business reputation and user trust. Organizations in sectors relying heavily on web presence, such as e-commerce, media, and government services, may experience operational disruptions. The medium severity and requirement for user interaction somewhat limit the threat scope; however, the remote exploitability and public availability of the exploit code increase the urgency for mitigation. Failure to patch could lead to targeted attacks exploiting this vulnerability, especially in environments where phpwcms is used without additional security controls.
Mitigation Recommendations
Beyond upgrading to phpwcms versions 1.9.46 or 1.10.9, organizations should implement several practical measures: 1) Conduct a thorough inventory of phpwcms instances to identify affected versions. 2) Apply strict input validation and sanitization on all user-supplied parameters, especially those related to 'cpage_custom', to prevent malicious payloads from reaching deserialization routines. 3) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious deserialization patterns or anomalous requests targeting the vulnerable endpoint. 4) Monitor logs for unusual activity related to the Custom Source Tab component and file_get_contents/is_file function calls. 5) Restrict access to the vulnerable component by IP whitelisting or network segmentation where feasible. 6) Implement runtime application self-protection (RASP) solutions to detect and prevent exploitation attempts in real time. 7) Educate development and security teams about secure deserialization practices to avoid similar vulnerabilities in custom code.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-5498: Deserialization in slackero phpwcms
Description
A vulnerability was found in slackero phpwcms up to 1.9.45/1.10.8. It has been rated as critical. This issue affects the function file_get_contents/is_file of the file include/inc_lib/content/cnt21.readform.inc.php of the component Custom Source Tab. The manipulation of the argument cpage_custom leads to deserialization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.9.46 and 1.10.9 is able to address this issue. It is recommended to upgrade the affected component.
AI-Powered Analysis
Technical Analysis
CVE-2025-5498 is a deserialization vulnerability identified in slackero phpwcms versions up to 1.9.45 and 1.10.8. The flaw exists in the Custom Source Tab component, specifically within the file include/inc_lib/content/cnt21.readform.inc.php, affecting the functions file_get_contents and is_file. The vulnerability arises from improper handling of the 'cpage_custom' argument, which can be manipulated to trigger unsafe deserialization of user-supplied data. This deserialization flaw allows an attacker to remotely execute arbitrary code or manipulate application logic without authentication, as the attack vector is network accessible and does not require privileges. The vulnerability has a CVSS 4.0 score of 5.1, indicating medium severity, with an attack vector of network, low attack complexity, no privileges required, but requiring user interaction. The impact on confidentiality, integrity, and availability is low, but the exploitability is facilitated by the lack of authentication and network accessibility. Although no known exploits are currently observed in the wild, the public disclosure of the exploit increases the risk of exploitation. The vendor has addressed the issue in versions 1.9.46 and 1.10.9, and upgrading to these or later versions is recommended to remediate the vulnerability.
Potential Impact
For European organizations using slackero phpwcms, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized code execution or manipulation of content management functions, potentially compromising website integrity and availability. While the confidentiality impact is low, attackers could deface websites, inject malicious content, or disrupt services, affecting business reputation and user trust. Organizations in sectors relying heavily on web presence, such as e-commerce, media, and government services, may experience operational disruptions. The medium severity and requirement for user interaction somewhat limit the threat scope; however, the remote exploitability and public availability of the exploit code increase the urgency for mitigation. Failure to patch could lead to targeted attacks exploiting this vulnerability, especially in environments where phpwcms is used without additional security controls.
Mitigation Recommendations
Beyond upgrading to phpwcms versions 1.9.46 or 1.10.9, organizations should implement several practical measures: 1) Conduct a thorough inventory of phpwcms instances to identify affected versions. 2) Apply strict input validation and sanitization on all user-supplied parameters, especially those related to 'cpage_custom', to prevent malicious payloads from reaching deserialization routines. 3) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious deserialization patterns or anomalous requests targeting the vulnerable endpoint. 4) Monitor logs for unusual activity related to the Custom Source Tab component and file_get_contents/is_file function calls. 5) Restrict access to the vulnerable component by IP whitelisting or network segmentation where feasible. 6) Implement runtime application self-protection (RASP) solutions to detect and prevent exploitation attempts in real time. 7) Educate development and security teams about secure deserialization practices to avoid similar vulnerabilities in custom code.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-03T05:14:35.178Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 683efc06182aa0cae27d3674
Added to database: 6/3/2025, 1:43:34 PM
Last enriched: 7/11/2025, 7:04:35 AM
Last updated: 1/7/2026, 5:23:03 AM
Views: 44
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighCVE-2026-22162
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.