CVE-2025-14837
Remote Code Injection in ZZCMS 2025 Backend Module
Publication date: 2025-12-18
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| zzcms | zzcms | 2025 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-94 | The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
| CWE-74 | The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-14837 is a remote code execution vulnerability in ZZCMS 2025's backend website settings module. It occurs because the 'icp' parameter in the /admin/siteconfig.php file is improperly handled. Specifically, the 'stripfxg()' function reverses escaping applied by 'addfxg()', allowing malicious PHP code injected into the 'ICP' field to be written directly into the /inc/config.php file. Since this config file is included on every page, the injected code executes on every page request, enabling an authenticated attacker to run arbitrary PHP commands on the server. [1, 3]
How can this vulnerability impact me? :
This vulnerability allows an authenticated attacker to execute arbitrary PHP code remotely on the server hosting ZZCMS 2025. This can lead to full compromise of the web application, including unauthorized access, data manipulation, and disruption of service. The attacker can run any PHP commands, potentially leading to data theft, server takeover, or further attacks within the network. [1, 2, 3]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking for the presence of the vulnerable backend page `/admin/siteconfig.php` and by searching for suspicious or injected PHP code in the `icp` field within the `/inc/config.php` file. Since exploitation requires authenticated access, monitoring for unusual POST requests to `/admin/siteconfig.php` with the `icp` parameter containing PHP code is useful. Additionally, Google Dorking with the query `inurl:admin/siteconfig.php` can help identify vulnerable targets. Commands to detect exploitation attempts might include searching the web server logs for POST requests to `/admin/siteconfig.php` with suspicious payloads, for example using grep: `grep 'POST /admin/siteconfig.php' /var/log/apache2/access.log | grep icp` or scanning the `/inc/config.php` file for unexpected PHP code injections by running `grep -E "define\('icp','.*(eval|system|exec)" /path/to/inc/config.php`. [1, 2]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting access to the backend administration interface (`/admin/siteconfig.php`) to trusted administrators only, enforcing strong authentication, and monitoring for suspicious activity. Since the vulnerability arises from insecure input handling and code injection in the `icp` parameter, avoid using the affected ZZCMS 2025 version or replace the vulnerable component with a secure alternative. Removing or sanitizing any injected code in `/inc/config.php` is also critical. Currently, no known patches or countermeasures are available, so limiting access and replacing the affected software are recommended. [2]