{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-5497","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-06-03T05:14:32.944Z","datePublished":"2025-06-03T13:00:16.567Z","dateUpdated":"2025-08-20T08:53:07.592Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-08-20T08:53:07.592Z"},"title":"slackero phpwcms Feedimport processing.inc.php deserialization","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-502","lang":"en","description":"Deserialization"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-20","lang":"en","description":"Improper Input Validation"}]}],"affected":[{"vendor":"slackero","product":"phpwcms","versions":[{"version":"1.9.0","status":"affected"},{"version":"1.9.1","status":"affected"},{"version":"1.9.2","status":"affected"},{"version":"1.9.3","status":"affected"},{"version":"1.9.4","status":"affected"},{"version":"1.9.5","status":"affected"},{"version":"1.9.6","status":"affected"},{"version":"1.9.7","status":"affected"},{"version":"1.9.8","status":"affected"},{"version":"1.9.9","status":"affected"},{"version":"1.9.10","status":"affected"},{"version":"1.9.11","status":"affected"},{"version":"1.9.12","status":"affected"},{"version":"1.9.13","status":"affected"},{"version":"1.9.14","status":"affected"},{"version":"1.9.15","status":"affected"},{"version":"1.9.16","status":"affected"},{"version":"1.9.17","status":"affected"},{"version":"1.9.18","status":"affected"},{"version":"1.9.19","status":"affected"},{"version":"1.9.20","status":"affected"},{"version":"1.9.21","status":"affected"},{"version":"1.9.22","status":"affected"},{"version":"1.9.23","status":"affected"},{"version":"1.9.24","status":"affected"},{"version":"1.9.25","status":"affected"},{"version":"1.9.26","status":"affected"},{"version":"1.9.27","status":"affected"},{"version":"1.9.28","status":"affected"},{"version":"1.9.29","status":"affected"},{"version":"1.9.30","status":"affected"},{"version":"1.9.31","status":"affected"},{"version":"1.9.32","status":"affected"},{"version":"1.9.33","status":"affected"},{"version":"1.9.34","status":"affected"},{"version":"1.9.35","status":"affected"},{"version":"1.9.36","status":"affected"},{"version":"1.9.37","status":"affected"},{"version":"1.9.38","status":"affected"},{"version":"1.9.39","status":"affected"},{"version":"1.9.40","status":"affected"},{"version":"1.9.41","status":"affected"},{"version":"1.9.42","status":"affected"},{"version":"1.9.43","status":"affected"},{"version":"1.9.44","status":"affected"},{"version":"1.9.45","status":"affected"},{"version":"1.10.0","status":"affected"},{"version":"1.10.1","status":"affected"},{"version":"1.10.2","status":"affected"},{"version":"1.10.3","status":"affected"},{"version":"1.10.4","status":"affected"},{"version":"1.10.5","status":"affected"},{"version":"1.10.6","status":"affected"},{"version":"1.10.7","status":"affected"},{"version":"1.10.8","status":"affected"},{"version":"1.9.46","status":"unaffected"},{"version":"1.10.9","status":"unaffected"}],"modules":["Feedimport Module"]}],"descriptions":[{"lang":"en","value":"A vulnerability was detected in slackero phpwcms up to 1.9.45/1.10.8. The impacted element is an unknown function of the file include/inc_module/mod_feedimport/inc/processing.inc.php of the component Feedimport Module. Performing manipulation of the argument cnt_text results in deserialization. The attack can be initiated remotely. The exploit is now public and may be used. Upgrading to version 1.9.46 and 1.10.9 is sufficient to resolve this issue. The patch is named 41a72eca0baa9d9d0214fec97db2400bc082d2a9. It is recommended to upgrade the affected component."},{"lang":"de","value":"Eine Schwachstelle wurde in slackero phpwcms bis 1.9.45/1.10.8 gefunden. Es ist betroffen eine unbekannte Funktion der Datei include/inc_module/mod_feedimport/inc/processing.inc.php der Komponente Feedimport Module. Dank der Manipulation des Arguments cnt_text mit unbekannten Daten kann eine deserialization-Schwachstelle ausgenutzt werden. Es ist möglich, den Angriff aus der Ferne durchzuführen. Die Schwachstelle wurde öffentlich offengelegt und könnte ausgenutzt werden. Ein Upgrade auf Version 1.9.46 and 1.10.9 ist in der Lage, dieses Problem zu adressieren. Der Patch trägt den Namen 41a72eca0baa9d9d0214fec97db2400bc082d2a9. Es wird geraten, die betroffene Komponente zu aktualisieren."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"}}],"timeline":[{"time":"2025-06-03T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-06-03T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-08-20T10:57:36.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Dem0 (VulDB User)","type":"reporter"},{"lang":"en","value":"huuhungn (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.310912","name":"VDB-310912 | slackero phpwcms Feedimport processing.inc.php deserialization","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.310912","name":"VDB-310912 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.577999","name":"Submit #577999 | phpwcms 1.10.8 phar deserialization vulnerability","tags":["third-party-advisory"]},{"url":"https://github.com/3em0/cve_repo/blob/main/phpwcms/phar%20vulnerability%20in%20phpwcms.md","tags":["exploit"]},{"url":"https://github.com/slackero/phpwcms/commit/41a72eca0baa9d9d0214fec97db2400bc082d2a9","tags":["patch"]},{"url":"https://github.com/slackero/phpwcms/releases/tag/v1.10.9","tags":["patch"]}]},"adp":[{"references":[{"url":"https://github.com/3em0/cve_repo/blob/main/phpwcms/phar%20vulnerability%20in%20phpwcms.md","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-06-03T14:45:18.581475Z","id":"CVE-2025-5497","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-03T14:45:34.792Z"}}]}}