CVE-2025-15375

6.3 MEDIUM

📋 TL;DR

CVE-2025-15375 is a remote code execution vulnerability in EyouCMS versions up to 1.7.7, caused by insecure deserialization in the arcpagelist handler. Attackers can exploit this flaw by sending specially crafted requests to execute arbitrary code on affected systems. All EyouCMS installations up to version 1.7.7 are vulnerable if the vulnerable component is accessible.

💻 Affected Systems

Products:
  • EyouCMS
Versions: Up to and including version 1.7.7
Operating Systems: All platforms running EyouCMS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with the vulnerable component enabled are affected; the arcpagelist handler is part of the API controller.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary code, steal data, install malware, or pivot to other systems.

🟠

Likely Case

Remote code execution leading to web shell installation, data exfiltration, or service disruption.

🟢

If Mitigated

Limited impact if proper network segmentation and input validation controls are in place.

🌐 Internet-Facing: HIGH - The vulnerability can be exploited remotely without authentication, making internet-facing systems particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal systems are still vulnerable but require network access; risk depends on internal network segmentation.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof-of-concept exploit code is publicly available, making exploitation straightforward for attackers with basic skills.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.7.8

Vendor Advisory: Not provided in references

Restart Required: No

Instructions:

1. Backup your current installation. 2. Download EyouCMS version 1.7.8 from the official source. 3. Replace all files with the new version. 4. Verify the patch is applied by checking the version.

🔧 Temporary Workarounds

Disable vulnerable API endpoint

all

Temporarily disable or restrict access to the vulnerable Ajax.php API endpoint

# Add to .htaccess for Apache: RewriteRule ^application/api/controller/Ajax.php - [F]
# For Nginx: location ~ ^/application/api/controller/Ajax.php { deny all; }

Input validation filter

all

Add input validation to filter serialized data in the attstr parameter

# In application/api/controller/Ajax.php, add validation before unserialize()
# Example: if (!is_string($attstr) || strpos($attstr, 'O:') !== false) { die('Invalid input'); }

🧯 If You Can't Patch

  • Implement strict network access controls to limit access to the vulnerable endpoint
  • Deploy a web application firewall (WAF) with rules to block deserialization attacks

🔍 How to Verify

Check if Vulnerable:

Check if EyouCMS version is 1.7.7 or earlier and if the file application/api/controller/Ajax.php exists with unserialize() calls.

Check Version:

Check the version in the admin panel or look for version information in configuration files.

Verify Fix Applied:

Verify the version is 1.7.8 or later and check that the unserialize() function in Ajax.php has been secured or removed.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /application/api/controller/Ajax.php
  • Serialized data patterns in request parameters
  • PHP error logs showing unserialize warnings

Network Indicators:

  • HTTP requests containing serialized PHP objects in parameters
  • Traffic to the vulnerable endpoint from unexpected sources

SIEM Query:

source="web_logs" AND (uri="/application/api/controller/Ajax.php" OR parameters CONTAINS "attstr")

🔗 References

📤 Share & Export