Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66571: CWE-502: Deserialization of Untrusted Data in UNA CMS

0
Critical
VulnerabilityCVE-2025-66571cvecve-2025-66571cwe-502
Published: Thu Dec 04 2025 (12/04/2025, 20:43:52 UTC)
Source: CVE Database V5
Product: UNA CMS

Description

UNA CMS versions 9.0.0-RC1 - 14.0.0-RC4 contain a PHP object injection vulnerability in BxBaseMenuSetAclLevel.php where the profile_id POST parameter is passed to PHP unserialize() without proper handling, allowing remote, unauthenticated attackers to inject arbitrary PHP objects and potentially write and execute arbitrary PHP code.

AI-Powered Analysis

AILast updated: 12/11/2025, 22:12:26 UTC

Technical Analysis

CVE-2025-66571 is a critical vulnerability classified under CWE-502 (Deserialization of Untrusted Data) affecting UNA CMS versions from 9.0.0-RC1 up to 14.0.0-RC4. The vulnerability arises from insecure handling of the profile_id POST parameter in the BxBaseMenuSetAclLevel.php script, where the input is passed directly to PHP's unserialize() function without adequate sanitization or validation. This unsafe deserialization allows remote attackers to craft malicious serialized PHP objects that, when unserialized, can trigger PHP object injection. Such injection can lead to arbitrary code execution, enabling attackers to execute commands, manipulate data, or take full control of the affected web server. The exploit requires no authentication or user interaction, making it highly accessible to attackers scanning for vulnerable UNA CMS instances. The vulnerability has a CVSS 4.0 score of 9.3, reflecting its critical impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the ease of exploitation and severity warrant immediate attention. The lack of official patches at the time of disclosure increases the urgency for organizations to implement temporary mitigations such as disabling vulnerable functionality or applying web application firewall (WAF) rules to detect and block malicious payloads.

Potential Impact

For European organizations, the impact of CVE-2025-66571 is substantial. Exploitation can lead to complete compromise of UNA CMS-based websites, resulting in data breaches, defacement, unauthorized access to sensitive user information, and potential pivoting into internal networks. Public-facing UNA CMS installations used by businesses, government agencies, or critical infrastructure providers could be targeted for espionage, disruption, or ransomware deployment. The vulnerability's unauthenticated nature means attackers can exploit it at scale, increasing the risk of widespread incidents. Organizations relying on UNA CMS for community platforms, intranets, or customer portals face risks to their reputation and regulatory compliance, particularly under GDPR, due to potential personal data exposure. Additionally, service downtime caused by exploitation could disrupt operations and lead to financial losses.

Mitigation Recommendations

Immediate mitigation steps include: 1) Applying official patches or updates from UNA CMS as soon as they become available. 2) If patches are unavailable, disable or restrict access to the vulnerable BxBaseMenuSetAclLevel.php functionality, especially the profile_id POST parameter handling. 3) Implement strict input validation and sanitization to prevent unserialize() from processing untrusted data. 4) Deploy Web Application Firewalls (WAFs) with custom rules to detect and block malicious serialized payloads targeting this vulnerability. 5) Conduct thorough code audits to identify and refactor any other unsafe unserialize() calls within the CMS or custom modules. 6) Monitor web server logs and network traffic for suspicious POST requests containing serialized PHP objects. 7) Educate development and security teams about the risks of unsafe deserialization and secure coding practices. 8) Consider isolating UNA CMS instances in segmented network zones to limit lateral movement if compromised.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-12-04T16:17:41.799Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6931f4e10459f550ecf89e87

Added to database: 12/4/2025, 8:53:53 PM

Last enriched: 12/11/2025, 10:12:26 PM

Last updated: 1/19/2026, 5:55:38 AM

Views: 85

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats