e107 CMS thru 2.3.3 are vulnerable to insecure deserialization in the `install.php` script. The script processes user-controlled input in the `previous_steps` POST parameter using `unserialize(base64_decode())` without validation, allowing attackers to craft malicious serialized data. This could lead to remote code execution, arbitrary file operations, or denial of service, depending on available PHP object gadgets in the codebase.
Metrics
Affected Vendors & Products
References
History
Mon, 12 Jan 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
E107
E107 e107 |
|
| CPEs | cpe:2.3:a:e107:e107:*:*:*:*:*:*:*:* | |
| Vendors & Products |
E107
E107 e107 |
Fri, 10 Oct 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-502 | |
| Metrics |
cvssV3_1
|
Fri, 10 Oct 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | e107 CMS thru 2.3.3 are vulnerable to insecure deserialization in the `install.php` script. The script processes user-controlled input in the `previous_steps` POST parameter using `unserialize(base64_decode())` without validation, allowing attackers to craft malicious serialized data. This could lead to remote code execution, arbitrary file operations, or denial of service, depending on available PHP object gadgets in the codebase. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-10-10T19:02:22.126Z
Reserved: 2025-09-26T00:00:00.000Z
Link: CVE-2025-61505
Updated: 2025-10-10T19:02:17.519Z
Status : Analyzed
Published: 2025-10-10T19:15:38.257
Modified: 2026-01-12T16:36:43.003
Link: CVE-2025-61505
No data.
OpenCVE Enrichment
No data.