Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-5497
PUBLISHED
More InfoOfficial Page
Assigner-VulDB
Assigner Org ID-1af790b2-7ee1-4545-860a-a788eba489b5
View Known Exploited Vulnerability (KEV) details
Published At-03 Jun, 2025 | 13:00
Updated At-20 Aug, 2025 | 08:53
Rejected At-
▼CVE Numbering Authority (CNA)
slackero phpwcms Feedimport processing.inc.php deserialization

A vulnerability was detected in slackero phpwcms up to 1.9.45/1.10.8. The impacted element is an unknown function of the file include/inc_module/mod_feedimport/inc/processing.inc.php of the component Feedimport Module. Performing manipulation of the argument cnt_text results in deserialization. The attack can be initiated remotely. The exploit is now public and may be used. Upgrading to version 1.9.46 and 1.10.9 is sufficient to resolve this issue. The patch is named 41a72eca0baa9d9d0214fec97db2400bc082d2a9. It is recommended to upgrade the affected component.

Affected Products
Vendor
slackero
Product
phpwcms
Modules
  • Feedimport Module
Versions
Affected
  • 1.9.0
  • 1.9.1
  • 1.9.2
  • 1.9.3
  • 1.9.4
  • 1.9.5
  • 1.9.6
  • 1.9.7
  • 1.9.8
  • 1.9.9
  • 1.9.10
  • 1.9.11
  • 1.9.12
  • 1.9.13
  • 1.9.14
  • 1.9.15
  • 1.9.16
  • 1.9.17
  • 1.9.18
  • 1.9.19
  • 1.9.20
  • 1.9.21
  • 1.9.22
  • 1.9.23
  • 1.9.24
  • 1.9.25
  • 1.9.26
  • 1.9.27
  • 1.9.28
  • 1.9.29
  • 1.9.30
  • 1.9.31
  • 1.9.32
  • 1.9.33
  • 1.9.34
  • 1.9.35
  • 1.9.36
  • 1.9.37
  • 1.9.38
  • 1.9.39
  • 1.9.40
  • 1.9.41
  • 1.9.42
  • 1.9.43
  • 1.9.44
  • 1.9.45
  • 1.10.0
  • 1.10.1
  • 1.10.2
  • 1.10.3
  • 1.10.4
  • 1.10.5
  • 1.10.6
  • 1.10.7
  • 1.10.8
Unaffected
  • 1.9.46
  • 1.10.9
Problem Types
TypeCWE IDDescription
CWECWE-502Deserialization
CWECWE-20Improper Input Validation
Metrics
VersionBase scoreBase severityVector
4.05.3MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
3.16.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
3.06.3MEDIUM
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
2.06.5N/A
AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

reporter
Dem0 (VulDB User)
analyst
huuhungn (VulDB User)
Timeline
EventDate
Advisory disclosed2025-06-03 00:00:00
VulDB entry created2025-06-03 02:00:00
VulDB entry last update2025-08-20 10:57:36
Replaced By

Rejected Reason

References
HyperlinkResource
https://vuldb.com/?id.310912
vdb-entry
technical-description
https://vuldb.com/?ctiid.310912
signature
permissions-required
https://vuldb.com/?submit.577999
third-party-advisory
https://github.com/3em0/cve_repo/blob/main/phpwcms/phar%20vulnerability%20in%20phpwcms.md
exploit
https://github.com/slackero/phpwcms/commit/41a72eca0baa9d9d0214fec97db2400bc082d2a9
patch
https://github.com/slackero/phpwcms/releases/tag/v1.10.9
patch
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/3em0/cve_repo/blob/main/phpwcms/phar%20vulnerability%20in%20phpwcms.md
exploit
Details not found