phpwcms, Deserialization Vulnerability, CVE-2025-5497 (Critical)

Listen to this Post

How the CVE Works

The vulnerability in phpwcms (up to versions 1.9.45/1.10.8) resides in the Feedimport Module’s `include/inc_module/mod_feedimport/inc/processing.inc.php` file. Attackers can exploit insecure deserialization via the `cnt_text` argument, allowing remote code execution. The flaw occurs due to improper validation of serialized data, enabling malicious payloads to trigger arbitrary PHP object injection. This can lead to full system compromise under the web server’s privileges. Publicly disclosed exploits increase the urgency for patching.

DailyCVE Form

Platform: phpwcms
Version: ≤1.9.45/1.10.8
Vulnerability: Remote Deserialization
Severity: Critical
Date: 06/03/2025

Prediction: Patch by 07/15/2025

What Undercode Say

grep -r "unserialize(" include/inc_module/mod_feedimport/
curl -X POST -d "cnt_text=<malicious_serialized>" http://target/feedimport

How Exploit

1. Craft malicious serialized payload.

2. Send via `cnt_text` parameter to `processing.inc.php`.

3. Trigger deserialization for RCE.

Protection from this CVE

  • Update to v1.9.46/1.10.9.
  • Disable Feedimport Module.
  • Implement input sanitization.

Impact

  • Remote Code Execution.
  • System compromise.
  • Data leakage.

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top