CVE-2025-1113

6.3 MEDIUM

📋 TL;DR

This critical vulnerability in tarzan-cms allows remote attackers to execute arbitrary code through insecure deserialization in the theme upload function. Attackers can exploit this to take control of affected systems. All users of tarzan-cms up to version 1.0.0 are affected.

💻 Affected Systems

Products:
  • tarzan-cms
Versions: up to 1.0.0
Operating Systems: All platforms running tarzan-cms
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default installation; requires admin access to /admin#themes endpoint.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with remote code execution leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Unauthorized file upload leading to web shell installation and subsequent server compromise.

🟢

If Mitigated

Attack blocked at network perimeter or detected by security controls before exploitation.

🌐 Internet-Facing: HIGH - Remote exploitation possible without authentication, making internet-facing instances immediate targets.
🏢 Internal Only: MEDIUM - Internal systems still vulnerable but require network access; could be exploited via phishing or compromised internal accounts.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires admin access to the theme upload function; public exploit code available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://gitee.com/taisan/tarzan-cms/issues/IBHZ0J

Restart Required: No

Instructions:

No official patch available. Consider migrating to alternative CMS or implementing strict workarounds.

🔧 Temporary Workarounds

Disable Theme Upload

all

Remove or restrict access to the vulnerable theme upload endpoint

# Remove or rename the themes upload directory
# Example: mv /path/to/tarzan-cms/admin/themes /path/to/tarzan-cms/admin/themes.disabled

Web Application Firewall Rules

all

Block requests to the vulnerable endpoint using WAF

# Example ModSecurity rule: SecRule REQUEST_URI "@contains /admin#themes" "id:1001,phase:1,deny"

🧯 If You Can't Patch

  • Isolate affected systems from internet access and restrict to internal network only
  • Implement strict network segmentation and monitor all traffic to/from affected systems

🔍 How to Verify

Check if Vulnerable:

Check if tarzan-cms version is 1.0.0 or earlier and if /admin#themes endpoint is accessible

Check Version:

# Check tarzan-cms version in configuration files or admin panel

Verify Fix Applied:

Verify theme upload functionality is disabled or patched version is installed

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to /admin#themes endpoint
  • Deserialization errors in application logs
  • Unexpected process execution from web server

Network Indicators:

  • POST requests to /admin#themes with serialized data
  • Outbound connections from web server to unknown IPs

SIEM Query:

source="web_logs" AND uri="/admin#themes" AND method="POST" AND size>100000

🔗 References

📤 Share & Export