CVE-2025-5497

6.3 MEDIUM

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code through deserialization of untrusted data in phpwcms's Feedimport module. Attackers can exploit this by manipulating the cnt_text parameter to achieve remote code execution. All users running affected versions of slackero phpwcms are vulnerable.

💻 Affected Systems

Products:
  • slackero phpwcms
Versions: Up to version 1.9.45 and 1.10.8
Operating Systems: All operating systems running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the Feedimport module to be enabled, but this is a standard component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with remote code execution leading to data theft, ransomware deployment, or creation of persistent backdoors.

🟠

Likely Case

Remote code execution allowing attackers to deface websites, steal sensitive data, or use the server for malicious activities.

🟢

If Mitigated

Limited impact if proper input validation and deserialization controls are in place, but still potentially exploitable.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit is publicly available and can be executed remotely without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.9.46 and 1.10.9

Vendor Advisory: https://github.com/slackero/phpwcss/releases/tag/v1.10.9

Restart Required: No

Instructions:

1. Backup your current installation. 2. Download the patched version from the official repository. 3. Replace affected files with patched versions. 4. Verify the patch is applied by checking the file hash matches the commit 41a72eca0baa9d9d0214fec97db2400bc082d2a9.

🔧 Temporary Workarounds

Disable Feedimport Module

linux

Temporarily disable the vulnerable Feedimport module to prevent exploitation.

mv include/inc_module/mod_feedimport include/inc_module/mod_feedimport.disabled

Input Validation Filter

all

Add input validation to sanitize cnt_text parameter before processing.

Add validation in processing.inc.php to filter or reject malicious input

🧯 If You Can't Patch

  • Implement strict WAF rules to block requests containing serialized objects in cnt_text parameter.
  • Restrict network access to the phpwcms instance and monitor for suspicious activity.

🔍 How to Verify

Check if Vulnerable:

Check if your phpwcms version is 1.9.45 or earlier, or 1.10.8 or earlier, and if the Feedimport module is present.

Check Version:

Check the version in the phpwcms configuration files or admin panel.

Verify Fix Applied:

Verify that the file include/inc_module/mod_feedimport/inc/processing.inc.php has been updated with the patch from commit 41a72eca0baa9d9d0214fec97db2400bc082d2a9.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to feedimport endpoints with serialized data in cnt_text parameter
  • PHP errors related to deserialization

Network Indicators:

  • HTTP requests containing serialized PHP objects in parameters
  • Traffic to feedimport module from unexpected sources

SIEM Query:

source="web_logs" AND (uri="*feedimport*" AND post_data="*cnt_text*" AND post_data="*O:*")

🔗 References

📤 Share & Export