CVE-2025-1741

4.7 MEDIUM

📋 TL;DR

This vulnerability in b1gMail allows remote attackers to perform deserialization attacks via the query/q parameter in the admin users.php file. It affects b1gMail installations up to version 7.4.1-pl1, potentially allowing attackers to execute arbitrary code or manipulate application data. Only systems with the vulnerable component exposed are affected.

💻 Affected Systems

Products:
  • b1gMail
Versions: Up to and including 7.4.1-pl1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires access to admin page functionality; affects both open source and discontinued commercial editions

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or server takeover

🟠

Likely Case

Application data manipulation, privilege escalation, or denial of service

🟢

If Mitigated

Limited impact due to proper input validation and access controls

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires access to admin functionality; proof-of-concept details available in public gist

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.4.1-pl2

Vendor Advisory: https://github.com/b1gMail-OSS/b1gMail/releases/tag/7.4.1-pl2

Restart Required: No

Instructions:

1. Backup current installation. 2. Download version 7.4.1-pl2 from official repository. 3. Replace affected files. 4. Verify patch application using commit hash 4816c8b748f6a5b965c8994e2cf10861bf6e68aa.

🔧 Temporary Workarounds

Input Validation Filter

all

Add input validation to sanitize query/q parameter before deserialization

Modify src/admin/users.php to validate/sanitize query parameters before processing

Access Restriction

all

Restrict access to admin pages to trusted IP addresses only

Add IP whitelisting to .htaccess or web server configuration for admin directory

🧯 If You Can't Patch

  • Implement strict input validation for all query parameters
  • Restrict admin page access to internal networks only

🔍 How to Verify

Check if Vulnerable:

Check if b1gMail version is 7.4.1-pl1 or earlier and if src/admin/users.php exists with vulnerable code

Check Version:

Check version in b1gMail admin panel or examine version files in installation directory

Verify Fix Applied:

Verify commit hash 4816c8b748f6a5b965c8994e2cf10861bf6e68aa is present in installation

📡 Detection & Monitoring

Log Indicators:

  • Unusual query parameters in admin access logs
  • Multiple failed deserialization attempts

Network Indicators:

  • Suspicious POST requests to admin/users.php with crafted query parameters

SIEM Query:

source="web_access.log" AND uri="/admin/users.php" AND (query="*" OR q="*")

🔗 References

📤 Share & Export