CVE-2025-45242

7.7 HIGH

📋 TL;DR

This vulnerability in Rhymix CMS allows authenticated administrators to delete arbitrary files on the server through the procFileAdminEditImage method. Attackers with admin access can delete critical system files, potentially causing service disruption or complete system compromise. All Rhymix installations using version 2.1.22 are affected.

💻 Affected Systems

Products:
  • Rhymix CMS
Versions: 2.1.22
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated administrator access to exploit. All installations using the vulnerable version are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through deletion of critical system files, leading to service disruption, data loss, or privilege escalation by removing security controls.

🟠

Likely Case

Service disruption through deletion of application files, configuration files, or user-uploaded content, potentially causing website downtime or data loss.

🟢

If Mitigated

Limited impact if proper access controls restrict admin privileges and file system permissions prevent deletion of critical files.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrator credentials. The vulnerability is in a core administrative function, making exploitation straightforward once admin access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1.23 or later

Vendor Advisory: https://github.com/rhymix/rhymix

Restart Required: No

Instructions:

1. Backup your Rhymix installation and database. 2. Download the latest version from https://github.com/rhymix/rhymix. 3. Replace the vulnerable files with patched versions. 4. Verify the fix by checking the version in the admin panel.

🔧 Temporary Workarounds

Restrict Admin Access

all

Limit administrator accounts to trusted users only and implement strong authentication controls.

File System Permissions

linux

Set restrictive file permissions on critical system directories to prevent deletion even if exploited.

chmod 755 /path/to/rhymix
chown www-data:www-data /path/to/rhymix -R

🧯 If You Can't Patch

  • Implement strict access controls on administrator accounts and monitor admin activity logs
  • Deploy file integrity monitoring to detect unauthorized file deletions

🔍 How to Verify

Check if Vulnerable:

Check the Rhymix version in the admin panel or by examining the /common/defaults.php file for version information.

Check Version:

grep -r "RX_VERSION" /path/to/rhymix/common/defaults.php

Verify Fix Applied:

Verify the version is 2.1.23 or later and test the procFileAdminEditImage functionality with safe test files.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file deletion events in application logs
  • Multiple failed file operations followed by successful deletions
  • Admin account activity from unusual IP addresses

Network Indicators:

  • HTTP POST requests to /file/file.admin.controller.php with file deletion parameters

SIEM Query:

source="rhymix_logs" AND (event="file_deletion" OR method="procFileAdminEditImage") AND status="success"

🔗 References

📤 Share & Export