CVE-2025-7101

6.3 MEDIUM

📋 TL;DR

This critical vulnerability in BoyunCMS allows remote attackers to execute arbitrary code by manipulating the db_pass parameter during installation. It affects all BoyunCMS installations up to version 1.4.20 that have the vulnerable /install/install_ok.php file accessible. Attackers can exploit this without authentication to gain control of affected systems.

💻 Affected Systems

Products:
  • BoyunCMS
Versions: up to and including 1.4.20
Operating Systems: All platforms running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the installation component which should be removed after installation but often remains accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise leading to data theft, ransomware deployment, or creation of persistent backdoors.

🟠

Likely Case

Web server compromise allowing website defacement, data exfiltration, or use as attack platform.

🟢

If Mitigated

Limited impact if file is properly removed after installation or access is restricted.

🌐 Internet-Facing: HIGH - Remote exploitation possible without authentication.
🏢 Internal Only: MEDIUM - Still exploitable from internal networks but attack surface reduced.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details available, making this easily weaponizable by attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown - check vendor for updates

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Check BoyunCMS vendor website for security updates. 2. If patch available, apply immediately. 3. Remove /install/ directory if not needed.

🔧 Temporary Workarounds

Remove installation directory

linux

Delete or restrict access to the vulnerable /install/ directory after installation

rm -rf /path/to/boyuncms/install/
chmod 000 /path/to/boyuncms/install/

Web server access restriction

all

Block access to install_ok.php via web server configuration

<Location "/install/install_ok.php">
    Deny from all
</Location>

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate BoyunCMS instances
  • Deploy web application firewall (WAF) with rules to block code injection patterns

🔍 How to Verify

Check if Vulnerable:

Check if /install/install_ok.php exists and BoyunCMS version is ≤1.4.20

Check Version:

Check BoyunCMS configuration files or admin panel for version information

Verify Fix Applied:

Verify /install/ directory is removed or inaccessible, and version is >1.4.20

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /install/install_ok.php
  • PHP error logs showing code execution attempts
  • Web server logs with suspicious db_pass parameter values

Network Indicators:

  • HTTP requests to install_ok.php with encoded payloads in parameters
  • Outbound connections from web server to unknown IPs

SIEM Query:

source="web_server" AND (uri="/install/install_ok.php" OR uri LIKE "%/install_ok.php%") AND method="POST"

🔗 References

📤 Share & Export