Deserialization Vulnerability in westboy CicadasCMS Template Management
CVE-2025-1556

5.1MEDIUM

Key Information:

Vendor
Westboy
Status
Cicadascms
Vendor
CVE Published:
22 February 2025

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A deserialization vulnerability has been identified in the Template Management component of westboy CicadasCMS version 1.0. This security flaw affects the processing of files in the /system directory, where improper handling can lead to unauthorized remote exploitation. The nature of the vulnerability allows attackers to manipulate serialized data, which could compromise the integrity and security of the application. Awareness of this issue is crucial, as public disclosure has raised the potential for active exploitation in the wild.

Affected Version(s)

CicadasCMS 1.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
5.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

nu11 (VulDB User)
.