CVE-2025-65657

6.5 MEDIUM

📋 TL;DR

CVE-2025-65657 is a remote code execution vulnerability in FeehiCMS version 2.1.1 that allows authenticated attackers to upload malicious PHP files through the Ad Management feature. This vulnerability enables attackers to execute arbitrary code on the server, potentially compromising the entire system. Only FeehiCMS 2.1.1 installations with authenticated user access are affected.

💻 Affected Systems

Products:
  • FeehiCMS
Versions: 2.1.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the Ad Management feature. Default installations with admin or editor roles are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise leading to data theft, ransomware deployment, lateral movement within the network, and persistent backdoor installation.

🟠

Likely Case

Webshell installation allowing file system access, data exfiltration, and further exploitation of the server and connected systems.

🟢

If Mitigated

Limited impact with proper file upload restrictions, web application firewalls, and network segmentation preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once credentials are obtained. Public proof-of-concept exists in GitHub repositories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: https://github.com/liufee/cms/issues/78

Restart Required: No

Instructions:

No official patch available. Upgrade to a newer version if available, or implement workarounds. Monitor the GitHub issue for official fixes.

🔧 Temporary Workarounds

Restrict File Upload Types

all

Configure web server or application to only allow specific non-executable file types (jpg, png, pdf, txt) and block PHP files.

# Apache: Add to .htaccess
<FilesMatch "\.(php|php3|php4|php5|phtml|pl|cgi|exe|dll|bat|cmd|com|vbs|vbe|js|jse|wsf|wsh|msc|sh|bash|dmg|app|jar|pif|scr|reg|cpl|msi|msp|hta|vb|vbs|ws|wsc|wsh)$">
    Order Allow,Deny
    Deny from all
</FilesMatch>
# Nginx: Add to server block
location ~ \.(php|php3|php4|php5|phtml|pl|cgi|exe|dll|bat|cmd|com|vbs|vbe|js|jse|wsf|wsh|msc|sh|bash|dmg|app|jar|pif|scr|reg|cpl|msi|msp|hta|vb|vbs|ws|wsc|wsh)$ {
    deny all;
}

Disable Ad Management Feature

linux

Temporarily disable or restrict access to the vulnerable Ad Management module until a proper fix is available.

# Remove or rename the Ad Management directory
mv /path/to/feehicms/admin/ad_management /path/to/feehicms/admin/ad_management.disabled
# Or modify permissions
chmod 000 /path/to/feehicms/admin/ad_management

🧯 If You Can't Patch

  • Implement strict file upload validation in the application code to only allow specific file extensions and MIME types.
  • Deploy a web application firewall (WAF) with rules to block PHP file uploads and suspicious POST requests to upload endpoints.

🔍 How to Verify

Check if Vulnerable:

Check if FeehiCMS version is 2.1.1 by examining the version file or admin panel. Test authenticated file upload functionality in Ad Management with a PHP file.

Check Version:

grep -r "version" /path/to/feehicms/ | grep -i "2.1.1"

Verify Fix Applied:

Attempt to upload a PHP file through the Ad Management feature after implementing workarounds. Verify the file is blocked or saved with non-executable permissions.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads with .php extension in web server logs
  • POST requests to /admin/ad_management/upload endpoints with PHP files
  • Multiple failed upload attempts followed by successful PHP file upload

Network Indicators:

  • HTTP POST requests containing PHP code in body to upload endpoints
  • Subsequent connections to uploaded PHP files from unusual IP addresses

SIEM Query:

source="web_server_logs" AND (uri_path="/admin/ad_management/upload" OR file_extension=".php") AND http_method="POST"

🔗 References

📤 Share & Export