CVE-2025-7216

7.3 HIGH

📋 TL;DR

This critical vulnerability in Aidigu software allows remote attackers to execute arbitrary code through PHP object deserialization in the checkUserCookie function. Attackers can exploit this to gain unauthorized access and control over affected systems. All users running Aidigu versions up to 1.8.2 are affected.

💻 Affected Systems

Products:
  • lty628 Aidigu
Versions: up to 1.8.2
Operating Systems: Any OS running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the PHP Object Handler component in /application/common.php

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, and lateral movement within the network

🟠

Likely Case

Unauthorized access to the application, privilege escalation, and potential data exfiltration

🟢

If Mitigated

Limited impact if proper network segmentation and input validation are implemented

🌐 Internet-Facing: HIGH - Remote exploitation possible without authentication
🏢 Internal Only: MEDIUM - Still exploitable from internal networks but requires network access

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit has been publicly disclosed and remote exploitation is possible

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Check vendor website for updates or consider workarounds.

🔧 Temporary Workarounds

Disable rememberMe functionality

all

Temporarily disable the rememberMe cookie functionality that triggers the vulnerable deserialization

Modify /application/common.php to remove or comment out rememberMe cookie handling

Input validation filter

all

Add input validation to sanitize cookie data before deserialization

Add input sanitization in checkUserCookie function before unserialize() calls

🧯 If You Can't Patch

  • Implement WAF rules to block suspicious deserialization patterns in HTTP requests
  • Restrict network access to Aidigu application using firewall rules

🔍 How to Verify

Check if Vulnerable:

Check if Aidigu version is 1.8.2 or earlier and if /application/common.php contains vulnerable checkUserCookie function

Check Version:

Check application configuration files or vendor documentation for version information

Verify Fix Applied:

Verify that rememberMe cookie handling has been modified or disabled in the code

📡 Detection & Monitoring

Log Indicators:

  • Unusual rememberMe cookie values in access logs
  • Multiple failed authentication attempts with crafted cookies

Network Indicators:

  • HTTP requests with unusually long or encoded rememberMe cookie parameters

SIEM Query:

source="web_logs" AND (cookie="*rememberMe*" AND (cookie_length>500 OR cookie CONTAINS "O:"))

🔗 References

📤 Share & Export