CVE-2025-61505
BaseFortify
Publication date: 2025-10-10
Last updated on: 2025-10-14
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| vfront | vfront | 0.99.52 |
| e107 | e107 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-502 | The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in e107 CMS versions up to 2.3.3 in the install.php script. It involves insecure deserialization where the script unserializes user-controlled input from the previous_steps POST parameter without validation. Attackers can exploit this by crafting malicious serialized data, potentially leading to remote code execution, arbitrary file operations, or denial of service.
How can this vulnerability impact me? :
The vulnerability can allow attackers to execute remote code on the server, perform arbitrary file operations, or cause denial of service. This can compromise the security and availability of the affected system.