CVE-2025-61488

7.6 HIGH

📋 TL;DR

A remote code execution vulnerability in SLiMS 9 Bulian allows attackers to execute arbitrary code via the scrap_image.php component. This affects all systems running the vulnerable version of this library management software. Attackers can compromise the entire server if successful.

💻 Affected Systems

Products:
  • Senayan Library Management System (SLiMS) 9 Bulian
Versions: v.9.6.1
Operating Systems: Any OS running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Requires scrap_image.php to be accessible and imageURL parameter to be improperly validated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise allowing attacker to install malware, steal data, pivot to internal networks, or use server for cryptocurrency mining or DDoS attacks.

🟠

Likely Case

Web server compromise leading to data theft, defacement, or installation of backdoors for persistent access.

🟢

If Mitigated

Attack blocked at WAF or network perimeter; no impact if proper input validation and file upload restrictions are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

GitHub issue shows exploitation details; simple HTTP request with crafted imageURL parameter can trigger RCE.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check GitHub issue for latest patched version

Vendor Advisory: https://github.com/slims/slims9_bulian/issues/299

Restart Required: No

Instructions:

1. Check GitHub issue #299 for patch details. 2. Update to latest SLiMS version. 3. Apply security patches for scrap_image.php component. 4. Validate all user inputs in imageURL parameter.

🔧 Temporary Workarounds

Disable scrap_image.php

linux

Temporarily disable or restrict access to vulnerable component

mv /path/to/slims/scrap_image.php /path/to/slims/scrap_image.php.disabled
chmod 000 /path/to/slims/scrap_image.php

WAF Rule Block

all

Block malicious requests to scrap_image.php with imageURL parameter

🧯 If You Can't Patch

  • Implement strict input validation for imageURL parameter
  • Restrict file upload capabilities and disable remote URL fetching

🔍 How to Verify

Check if Vulnerable:

Check if scrap_image.php exists and is accessible; test with controlled payload in imageURL parameter.

Check Version:

Check SLiMS version in admin panel or read version file

Verify Fix Applied:

Verify scrap_image.php has proper input validation or is disabled; test exploitation attempts fail.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to scrap_image.php with unusual imageURL parameters
  • PHP execution errors in web logs
  • Unusual file creation in web directories

Network Indicators:

  • HTTP POST/GET requests to scrap_image.php with encoded payloads
  • Outbound connections from web server to attacker-controlled systems

SIEM Query:

source="web_logs" AND uri="*scrap_image.php*" AND (param="*imageURL*" OR user_agent="*curl*" OR user_agent="*wget*")

🔗 References

📤 Share & Export