CVE-2025-11023

9.8 CRITICAL

📋 TL;DR

This CVE describes a PHP Local File Inclusion vulnerability in ArkSigner's AcBakImzala software that allows attackers to include and execute arbitrary local files. The vulnerability affects all versions before v5.1.4 and can lead to remote code execution. This is a critical vulnerability with a CVSS score of 9.8 affecting PHP-based systems running vulnerable versions.

💻 Affected Systems

Products:
  • ArkSigner Software and Hardware Inc. AcBakImzala
Versions: All versions before v5.1.4
Operating Systems: Any OS running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Affects PHP installations where the software is deployed; requires PHP to be enabled and the application to be accessible.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data exfiltration, and lateral movement within the network.

🟠

Likely Case

Unauthorized file access, sensitive information disclosure, and potential privilege escalation.

🟢

If Mitigated

Limited impact with proper file permissions and web server hardening, though vulnerability still exists.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

PHP LFI vulnerabilities are typically easy to exploit with publicly available techniques, though no specific PoC is confirmed for this CVE.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v5.1.4

Vendor Advisory: https://www.usom.gov.tr/bildirim/tr-25-0356

Restart Required: Yes

Instructions:

1. Download v5.1.4 from official vendor sources. 2. Backup current installation and data. 3. Stop the AcBakImzala service. 4. Replace files with patched version. 5. Restart the service and verify functionality.

🔧 Temporary Workarounds

Disable PHP include functions

all

Restrict PHP's ability to include files from untrusted sources via php.ini configuration.

php.ini: allow_url_include = Off
php.ini: allow_url_fopen = Off

Web server file restriction

all

Configure web server to block requests with suspicious file inclusion patterns.

Apache: RewriteRule .*\.php.* - [F]
Nginx: location ~ \.php$ { deny all; }

🧯 If You Can't Patch

  • Implement strict input validation and sanitization for all user-controlled file paths.
  • Deploy web application firewall (WAF) rules to block LFI attack patterns and monitor for exploitation attempts.

🔍 How to Verify

Check if Vulnerable:

Check the software version in the admin interface or configuration files; if version is below 5.1.4, the system is vulnerable.

Check Version:

Check application configuration files or admin panel for version information.

Verify Fix Applied:

After patching, verify the version shows v5.1.4 or higher and test file inclusion attempts return errors instead of executing.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file path patterns in web server logs (e.g., ../../etc/passwd)
  • PHP error logs showing include/require failures with suspicious paths

Network Indicators:

  • HTTP requests with file inclusion parameters (e.g., ?page=../../../etc/passwd)
  • Unusual outbound connections from the web server

SIEM Query:

source="web_server" AND (uri="*../*" OR uri="*php*" OR param="*page*" OR param="*file*")

🔗 References

📤 Share & Export