CVE-2025-5497

A vulnerability was detected in slackero phpwcms up to 1.9.45/1.10.8. The impacted element is an unknown function of the file include/inc_module/mod_feedimport/inc/processing.inc.php of the component Feedimport Module. Performing manipulation of the argument cnt_text results in deserialization. The attack can be initiated remotely. The exploit is now public and may be used. Upgrading to version 1.9.46 and 1.10.9 is sufficient to resolve this issue. The patch is named 41a72eca0baa9d9d0214fec97db2400bc082d2a9. It is recommended to upgrade the affected component.
Configurations

Configuration 1 (hide)

cpe:2.3:a:phpwcms:phpwcms:*:*:*:*:*:*:*:*

History

20 Aug 2025, 09:15

Type Values Removed Values Added
Summary A vulnerability was found in slackero phpwcms up to 1.9.45/1.10.8. It has been declared as critical. This vulnerability affects unknown code of the file include/inc_module/mod_feedimport/inc/processing.inc.php of the component Feedimport Module. The manipulation of the argument cnt_text leads to deserialization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.9.46 and 1.10.9 is able to address this issue. It is recommended to upgrade the affected component. A vulnerability was detected in slackero phpwcms up to 1.9.45/1.10.8. The impacted element is an unknown function of the file include/inc_module/mod_feedimport/inc/processing.inc.php of the component Feedimport Module. Performing manipulation of the argument cnt_text results in deserialization. The attack can be initiated remotely. The exploit is now public and may be used. Upgrading to version 1.9.46 and 1.10.9 is sufficient to resolve this issue. The patch is named 41a72eca0baa9d9d0214fec97db2400bc082d2a9. It is recommended to upgrade the affected component.
References
  • () https://github.com/slackero/phpwcms/commit/41a72eca0baa9d9d0214fec97db2400bc082d2a9 -
References () https://vuldb.com/?id.310912 - Third Party Advisory, VDB Entry () https://vuldb.com/?id.310912 - Third Party Advisory, VDB Entry

13 Jun 2025, 19:44

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-502
First Time Phpwcms
Phpwcms phpwcms
CPE cpe:2.3:a:phpwcms:phpwcms:*:*:*:*:*:*:*:*
References () https://github.com/3em0/cve_repo/blob/main/phpwcms/phar%20vulnerability%20in%20phpwcms.md - () https://github.com/3em0/cve_repo/blob/main/phpwcms/phar%20vulnerability%20in%20phpwcms.md - Exploit, Third Party Advisory
References () https://github.com/slackero/phpwcms/releases/tag/v1.10.9 - () https://github.com/slackero/phpwcms/releases/tag/v1.10.9 - Release Notes
References () https://vuldb.com/?ctiid.310912 - () https://vuldb.com/?ctiid.310912 - Permissions Required, Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.577999 - () https://vuldb.com/?submit.577999 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?id.310912 - () https://vuldb.com/?id.310912 - Third Party Advisory, VDB Entry

03 Jun 2025, 15:15

Type Values Removed Values Added
CWE CWE-502
CWE-20
CVSS v2 : unknown
v3 : 6.3
v2 : unknown
v3 : unknown

03 Jun 2025, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-03 13:15

Updated : 2025-08-20 09:15


NVD link : CVE-2025-5497

Mitre link : CVE-2025-5497


JSON object : View

Products Affected

phpwcms

  • phpwcms
CWE
CWE-502

Deserialization of Untrusted Data