{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-11344","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-10-06T06:15:32.695Z","datePublished":"2025-10-06T18:32:05.924Z","dateUpdated":"2026-02-24T06:46:02.995Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-24T06:46:02.995Z"},"title":"ILIAS Certificate Import code injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-94","lang":"en","description":"Code Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"n/a","product":"ILIAS","versions":[{"version":"8.0","status":"affected"},{"version":"8.1","status":"affected"},{"version":"8.2","status":"affected"},{"version":"8.3","status":"affected"},{"version":"8.4","status":"affected"},{"version":"8.5","status":"affected"},{"version":"8.6","status":"affected"},{"version":"8.7","status":"affected"},{"version":"8.8","status":"affected"},{"version":"8.9","status":"affected"},{"version":"8.10","status":"affected"},{"version":"8.11","status":"affected"},{"version":"8.12","status":"affected"},{"version":"8.13","status":"affected"},{"version":"8.14","status":"affected"},{"version":"8.15","status":"affected"},{"version":"8.16","status":"affected"},{"version":"8.17","status":"affected"},{"version":"8.18","status":"affected"},{"version":"8.19","status":"affected"},{"version":"8.20","status":"affected"},{"version":"8.21","status":"affected"},{"version":"8.22","status":"affected"},{"version":"8.23","status":"affected"},{"version":"9.0","status":"affected"},{"version":"9.1","status":"affected"},{"version":"9.2","status":"affected"},{"version":"9.3","status":"affected"},{"version":"9.4","status":"affected"},{"version":"9.5","status":"affected"},{"version":"9.6","status":"affected"},{"version":"9.7","status":"affected"},{"version":"9.8","status":"affected"},{"version":"9.9","status":"affected"},{"version":"9.10","status":"affected"},{"version":"9.11","status":"affected"},{"version":"9.12","status":"affected"},{"version":"9.13","status":"affected"},{"version":"10.0","status":"affected"},{"version":"10.1","status":"affected"},{"version":"8.24","status":"unaffected"},{"version":"9.14","status":"unaffected"},{"version":"10.2","status":"unaffected"}],"cpes":["cpe:2.3:a:ilias:ilias:*:*:*:*:*:*:*:*"],"modules":["Certificate Import Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was detected in ILIAS up to 8.23/9.13/10.1. Affected by this vulnerability is an unknown functionality of the component Certificate Import Handler. The manipulation results in Remote Code Execution. The attack may be performed from remote. Upgrading to version 8.24, 9.14 and 10.2 addresses this issue. It is recommended to upgrade the affected component."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C"}}],"timeline":[{"time":"2025-10-06T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-10-06T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-01-24T12:05:34.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"rehme_srlabs (VulDB User)","type":"reporter"},{"lang":"en","value":"rehme_srlabs (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.327229","name":"VDB-327229 | ILIAS Certificate Import code injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.327229","name":"VDB-327229 | CTI Indicators (IOB, IOC, TTP)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.664889","name":"Submit #664889 | ILIAS open source e-Learning e. V. ILIAS >=8.0.0, <=10.1 Unrestricted Upload","tags":["third-party-advisory"]},{"url":"https://docu.ilias.de/go/blog/15821/882","tags":["related"]}],"tags":["x_open-source"]},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-94","lang":"en","description":"CWE-94 Improper Control of Generation of Code ('Code Injection')"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-10-06T19:30:49.329389Z","id":"CVE-2025-11344","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-06T19:31:55.598Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2026-01-23T18:23:44.521Z"},"references":[{"url":"https://srlabs.de/blog/breaking-ilias-part-2-three-to-rce"}],"title":"CVE Program Container","x_generator":{"engine":"ADPogram 0.0.1"}}]}}