CVE-2025-15394

4.7 MEDIUM

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on iCMS systems through code injection in the configuration parameter handler. Attackers can exploit this by manipulating POST parameters to inject malicious code that gets executed on the server. All iCMS installations up to version 8.0.0 are affected.

💻 Affected Systems

Products:
  • iCMS
Versions: up to 8.0.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. The vulnerability exists in the admin configuration component accessible via POST requests.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands, steal data, install backdoors, or pivot to other systems.

🟠

Likely Case

Unauthorized code execution leading to website defacement, data theft, or installation of cryptocurrency miners.

🟢

If Mitigated

Limited impact if proper input validation and WAF rules are in place, potentially resulting in failed exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details are publicly available. Attack requires access to the admin configuration interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available or implementing workarounds.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Add strict input validation to the Save function in ConfigAdmincp.php to sanitize config parameters

Edit app/config/ConfigAdmincp.php and implement parameter sanitization before processing

Access Restriction

all

Restrict access to the admin configuration interface using IP whitelisting or additional authentication

Configure web server (Apache/Nginx) to restrict access to admin paths

🧯 If You Can't Patch

  • Implement Web Application Firewall (WAF) rules to block suspicious POST requests to admin configuration endpoints
  • Monitor and audit all access to the admin configuration interface for unusual activity

🔍 How to Verify

Check if Vulnerable:

Check if iCMS version is 8.0.0 or earlier by examining version files or admin interface

Check Version:

Check iCMS version in admin panel or version.txt file

Verify Fix Applied:

Test if code injection attempts are properly blocked in the configuration save functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to ConfigAdmincp.php with suspicious parameter values
  • Multiple failed authentication attempts to admin interface

Network Indicators:

  • POST requests containing code injection patterns to admin configuration endpoints

SIEM Query:

source="web_logs" AND uri="*ConfigAdmincp.php*" AND method="POST" AND (param="*config*" OR body="*eval(*" OR body="*system(*")

🔗 References

📤 Share & Export