CVE-2025-7101
📋 TL;DR
This critical vulnerability in BoyunCMS allows remote attackers to execute arbitrary code by manipulating the db_pass parameter during installation. It affects all BoyunCMS installations up to version 1.4.20 that have the vulnerable /install/install_ok.php file accessible. Attackers can exploit this without authentication to gain control of affected systems.
💻 Affected Systems
- BoyunCMS
📦 What is this software?
Boyuncms by Boyuncms Project
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise leading to data theft, ransomware deployment, or creation of persistent backdoors.
Likely Case
Web server compromise allowing website defacement, data exfiltration, or use as attack platform.
If Mitigated
Limited impact if file is properly removed after installation or access is restricted.
🎯 Exploit Status
Public exploit details available, making this easily weaponizable by attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown - check vendor for updates
Vendor Advisory: Not available
Restart Required: No
Instructions:
1. Check BoyunCMS vendor website for security updates. 2. If patch available, apply immediately. 3. Remove /install/ directory if not needed.
🔧 Temporary Workarounds
Remove installation directory
linuxDelete or restrict access to the vulnerable /install/ directory after installation
rm -rf /path/to/boyuncms/install/
chmod 000 /path/to/boyuncms/install/
Web server access restriction
allBlock access to install_ok.php via web server configuration
<Location "/install/install_ok.php">
Deny from all
</Location>
🧯 If You Can't Patch
- Implement strict network segmentation to isolate BoyunCMS instances
- Deploy web application firewall (WAF) with rules to block code injection patterns
🔍 How to Verify
Check if Vulnerable:
Check if /install/install_ok.php exists and BoyunCMS version is ≤1.4.20
Check Version:
Check BoyunCMS configuration files or admin panel for version information
Verify Fix Applied:
Verify /install/ directory is removed or inaccessible, and version is >1.4.20
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /install/install_ok.php
- PHP error logs showing code execution attempts
- Web server logs with suspicious db_pass parameter values
Network Indicators:
- HTTP requests to install_ok.php with encoded payloads in parameters
- Outbound connections from web server to unknown IPs
SIEM Query:
source="web_server" AND (uri="/install/install_ok.php" OR uri LIKE "%/install_ok.php%") AND method="POST"