{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-14837","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-12-17T15:49:15.980Z","datePublished":"2025-12-17T23:32:07.466Z","dateUpdated":"2026-02-24T05:53:14.358Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-24T05:53:14.358Z"},"title":"ZZCMS Backend Website Settings siteconfig.php stripfxg code injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-94","lang":"en","description":"Code Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"n/a","product":"ZZCMS","versions":[{"version":"2025","status":"affected"}],"cpes":["cpe:2.3:a:zzcms:zzcms:*:*:*:*:*:*:*:*"],"modules":["Backend Website Settings Module"]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in ZZCMS 2025. Affected by this issue is the function stripfxg of the file /admin/siteconfig.php of the component Backend Website Settings Module. Such manipulation of the argument icp leads to code injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":4.7,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.7,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.8,"vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-12-17T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-12-17T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-12-30T20:37:02.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"airrudder (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.336987","name":"VDB-336987 | ZZCMS Backend Website Settings siteconfig.php stripfxg code injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.336987","name":"VDB-336987 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.711655","name":"Submit #711655 | zzcms zzcms2025 Command Injection","tags":["third-party-advisory"]},{"url":"https://note-hxlab.wetolink.com/share/ekNgcv2wVBya","tags":["exploit"]}]},"adp":[{"references":[{"url":"https://note-hxlab.wetolink.com/share/ekNgcv2wVBya","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-18T18:33:12.231221Z","id":"CVE-2025-14837","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-18T18:53:57.958Z"}}]}}