{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-11345","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-10-06T06:15:35.341Z","datePublished":"2025-10-06T19:02:05.514Z","dateUpdated":"2026-02-24T06:46:15.365Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-24T06:46:15.365Z"},"title":"ILIAS Test Import unserialize deserialization","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-502","lang":"en","description":"Deserialization"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-20","lang":"en","description":"Improper Input Validation"}]}],"affected":[{"vendor":"n/a","product":"ILIAS","versions":[{"version":"8.0","status":"affected"},{"version":"8.1","status":"affected"},{"version":"8.2","status":"affected"},{"version":"8.3","status":"affected"},{"version":"8.4","status":"affected"},{"version":"8.5","status":"affected"},{"version":"8.6","status":"affected"},{"version":"8.7","status":"affected"},{"version":"8.8","status":"affected"},{"version":"8.9","status":"affected"},{"version":"8.10","status":"affected"},{"version":"8.11","status":"affected"},{"version":"8.12","status":"affected"},{"version":"8.13","status":"affected"},{"version":"8.14","status":"affected"},{"version":"8.15","status":"affected"},{"version":"8.16","status":"affected"},{"version":"8.17","status":"affected"},{"version":"8.18","status":"affected"},{"version":"8.19","status":"affected"},{"version":"8.20","status":"affected"},{"version":"8.21","status":"affected"},{"version":"8.22","status":"affected"},{"version":"8.23","status":"affected"},{"version":"9.0","status":"affected"},{"version":"9.1","status":"affected"},{"version":"9.2","status":"affected"},{"version":"9.3","status":"affected"},{"version":"9.4","status":"affected"},{"version":"9.5","status":"affected"},{"version":"9.6","status":"affected"},{"version":"9.7","status":"affected"},{"version":"9.8","status":"affected"},{"version":"9.9","status":"affected"},{"version":"9.10","status":"affected"},{"version":"9.11","status":"affected"},{"version":"9.12","status":"affected"},{"version":"9.13","status":"affected"},{"version":"10.0","status":"affected"},{"version":"10.1","status":"affected"},{"version":"8.24","status":"unaffected"},{"version":"9.14","status":"unaffected"},{"version":"10.2","status":"unaffected"}],"cpes":["cpe:2.3:a:ilias:ilias:*:*:*:*:*:*:*:*"],"modules":["Test Import"]}],"descriptions":[{"lang":"en","value":"A flaw has been found in ILIAS up to 8.23/9.13/10.1. Affected by this issue is the function unserialize of the component Test Import. This manipulation causes deserialization. It is possible to initiate the attack remotely. Upgrading to version 8.24, 9.14 and 10.2 can resolve this issue. Upgrading the affected component is advised."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L/E:X/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L/E:X/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:ND/RL:OF/RC:C"}}],"timeline":[{"time":"2025-10-06T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-10-06T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-10-15T09:15:18.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"rehme_srlabs (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.327230","name":"VDB-327230 | ILIAS Test Import unserialize deserialization","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.327230","name":"VDB-327230 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.664891","name":"Submit #664891 | ILIAS open source e-Learning e. V.  ILIAS >=8.0.0, <=10.1 Deserialization","tags":["third-party-advisory"]},{"url":"https://docu.ilias.de/go/blog/15821/882","tags":["related"]}],"tags":["x_open-source"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-10-06T19:35:36.699440Z","id":"CVE-2025-11345","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-06T19:35:49.946Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2026-01-23T18:24:14.342Z"},"references":[{"url":"https://srlabs.de/blog/breaking-ilias-part-2-three-to-rce"}],"title":"CVE Program Container","x_generator":{"engine":"ADPogram 0.0.1"}}]}}