icon

We found results for “

CVE-2025-61505

Date: October 9, 2025

e107 CMS thru 2.3.3 are vulnerable to insecure deserialization in the "install.php" script. The script processes user-controlled input in the "previous_steps" POST parameter using "unserialize(base64_decode())" without validation, allowing attackers to craft malicious serialized data. This could lead to remote code execution, arbitrary file operations, or denial of service, depending on available PHP object gadgets in the codebase.

Severity Score

Severity Score

Weakness Type (CWE)

Deserialization of Untrusted Data

CWE-502

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): LOW
Integrity (I): LOW
Availability (A): NONE

Do you need more information?

Contact Us