CVE-2025-5499
📋 TL;DR
This critical vulnerability in slackero phpwcms allows remote attackers to execute arbitrary code through deserialization attacks via manipulated image file parameters. It affects all installations using vulnerable versions of the image_resized.php component. Attackers can exploit this without authentication to potentially take full control of affected systems.
💻 Affected Systems
- slackero phpwcms
📦 What is this software?
Phpwcms by Phpwcms
Phpwcms by Phpwcms
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise, data theft, and persistent backdoor installation.
Likely Case
Remote code execution allowing attackers to execute arbitrary commands, access sensitive data, and pivot to other systems.
If Mitigated
Limited impact if proper input validation and deserialization controls are implemented alongside network segmentation.
🎯 Exploit Status
Public exploit details available, making this easily weaponizable by attackers with basic skills.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.9.46 and 1.10.9
Vendor Advisory: https://github.com/slackero/phpwcms/releases/tag/v1.10.9
Restart Required: No
Instructions:
1. Backup your phpwcms installation and database. 2. Download the patched version from the official repository. 3. Replace the vulnerable files with patched versions. 4. Verify the update by checking the version number.
🔧 Temporary Workarounds
Disable image_resized.php
linuxTemporarily disable the vulnerable component by removing or restricting access to image_resized.php
mv /path/to/phpwcms/include/inc_front/image_resized.php /path/to/phpwcms/include/inc_front/image_resized.php.disabled
Input validation filter
allAdd input validation to reject suspicious image file parameters
Add validation in frontend code to reject non-standard image file extensions and paths
🧯 If You Can't Patch
- Implement strict WAF rules to block requests containing serialized data patterns
- Restrict network access to phpwcms instances and implement network segmentation
🔍 How to Verify
Check if Vulnerable:
Check if image_resized.php exists in your installation and verify the phpwcms version is below 1.9.46 or 1.10.9
Check Version:
grep -r 'PHPWCMS_VERSION' /path/to/phpwcms/ | head -1
Verify Fix Applied:
Verify the version number shows 1.9.46 or higher, or 1.10.9 or higher, and check that image_resized.php has been updated
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to image_resized.php with serialized data patterns
- PHP deserialization warnings or errors in logs
- Unexpected file writes or process executions
Network Indicators:
- HTTP requests to image_resized.php with base64-encoded or serialized payloads
- Outbound connections from phpwcms server to unknown IPs
SIEM Query:
source="web_logs" AND uri="*image_resized.php*" AND (payload="*O:*" OR payload="*a:*" OR payload="*s:*")