{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-11346","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-10-06T06:15:37.942Z","datePublished":"2025-10-06T19:32:05.171Z","dateUpdated":"2026-02-24T06:46:26.247Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-24T06:46:26.247Z"},"title":"ILIAS Base64 Decoding unserialize deserialization","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-502","lang":"en","description":"Deserialization"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-20","lang":"en","description":"Improper Input Validation"}]}],"affected":[{"vendor":"n/a","product":"ILIAS","versions":[{"version":"8.0","status":"affected"},{"version":"8.1","status":"affected"},{"version":"8.2","status":"affected"},{"version":"8.3","status":"affected"},{"version":"8.4","status":"affected"},{"version":"8.5","status":"affected"},{"version":"8.6","status":"affected"},{"version":"8.7","status":"affected"},{"version":"8.8","status":"affected"},{"version":"8.9","status":"affected"},{"version":"8.10","status":"affected"},{"version":"8.11","status":"affected"},{"version":"8.12","status":"affected"},{"version":"8.13","status":"affected"},{"version":"8.14","status":"affected"},{"version":"8.15","status":"affected"},{"version":"8.16","status":"affected"},{"version":"8.17","status":"affected"},{"version":"8.18","status":"affected"},{"version":"8.19","status":"affected"},{"version":"8.20","status":"affected"},{"version":"8.21","status":"affected"},{"version":"8.22","status":"affected"},{"version":"8.23","status":"affected"},{"version":"9.0","status":"affected"},{"version":"9.1","status":"affected"},{"version":"9.2","status":"affected"},{"version":"9.3","status":"affected"},{"version":"9.4","status":"affected"},{"version":"9.5","status":"affected"},{"version":"9.6","status":"affected"},{"version":"9.7","status":"affected"},{"version":"9.8","status":"affected"},{"version":"9.9","status":"affected"},{"version":"9.10","status":"affected"},{"version":"9.11","status":"affected"},{"version":"9.12","status":"affected"},{"version":"9.13","status":"affected"},{"version":"10.0","status":"affected"},{"version":"10.1","status":"affected"},{"version":"8.24","status":"unaffected"},{"version":"9.14","status":"unaffected"},{"version":"10.2","status":"unaffected"}],"cpes":["cpe:2.3:a:ilias:ilias:*:*:*:*:*:*:*:*"],"modules":["Base64 Decoding Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in ILIAS up to 8.23/9.13/10.1. This affects the function unserialize of the component Base64 Decoding Handler. Such manipulation of the argument f_settings leads to deserialization. It is possible to launch the attack remotely. Upgrading to version 8.24, 9.14 and 10.2 is able to mitigate this issue. It is advisable to upgrade the affected component."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:ND/RL:OF/RC:C"}}],"timeline":[{"time":"2025-10-06T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-10-06T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-10-15T09:15:18.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"rehme_srlabs (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.327231","name":"VDB-327231 | ILIAS Base64 Decoding unserialize deserialization","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.327231","name":"VDB-327231 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.664892","name":"Submit #664892 | ILIAS open source e-Learning e. V.  ILIAS >=8.0.0, <=10.1 Deserialization","tags":["third-party-advisory"]},{"url":"https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2113","tags":["government-resource"]}],"tags":["x_open-source"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-10-06T19:42:14.241299Z","id":"CVE-2025-11346","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-06T19:43:16.138Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2026-01-23T18:24:41.363Z"},"references":[{"url":"https://srlabs.de/blog/breaking-ilias-part-2-three-to-rce"}],"title":"CVE Program Container","x_generator":{"engine":"ADPogram 0.0.1"}}]}}