CVE-2024-25301

7.2 HIGH

📋 TL;DR

CVE-2024-25301 is a remote code execution vulnerability in Redaxo CMS v5.15.1 that allows attackers to execute arbitrary code via the /pages/templates.php component. This affects all systems running the vulnerable version of Redaxo, potentially compromising the entire web server and underlying infrastructure.

💻 Affected Systems

Products:
  • Redaxo CMS
Versions: v5.15.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation of Redaxo v5.15.1. No special configuration is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server takeover with attacker gaining full control over the web server, database access, and ability to pivot to other systems on the network.

🟠

Likely Case

Website defacement, data theft, malware deployment, and creation of persistent backdoors for future attacks.

🟢

If Mitigated

Limited impact with proper web application firewalls, network segmentation, and least privilege configurations in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authentication to the Redaxo admin panel. The vulnerability is in a core component and public proof-of-concept code exists.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v5.15.2 or later

Vendor Advisory: https://github.com/redaxo/redaxo/releases

Restart Required: No

Instructions:

1. Backup your Redaxo installation and database. 2. Download the latest version from the official Redaxo repository. 3. Replace the vulnerable files with patched versions. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict access to admin panel

all

Limit access to the Redaxo admin interface to trusted IP addresses only

# Add to .htaccess or web server config
Order deny,allow
Deny from all
Allow from 192.168.1.0/24
Allow from 10.0.0.0/8

Disable vulnerable component

linux

Temporarily disable or restrict access to the /pages/templates.php file

# Rename or move the vulnerable file
mv /path/to/redaxo/pages/templates.php /path/to/redaxo/pages/templates.php.disabled

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the Redaxo server from critical systems
  • Deploy a web application firewall (WAF) with specific rules to block RCE attempts

🔍 How to Verify

Check if Vulnerable:

Check if Redaxo version is exactly 5.15.1 by examining the version file or admin interface

Check Version:

grep -r "REDAXO_VERSION" /path/to/redaxo/ | head -1

Verify Fix Applied:

Verify the version has been updated to 5.15.2 or later and test the /pages/templates.php functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /pages/templates.php
  • Multiple failed login attempts followed by successful admin login
  • Suspicious file creation or modification in web directories

Network Indicators:

  • Unusual outbound connections from web server
  • Traffic patterns suggesting command and control communication

SIEM Query:

source="web_logs" AND (uri="/pages/templates.php" AND (method="POST" OR params CONTAINS "system" OR params CONTAINS "exec"))

🔗 References

📤 Share & Export