Remote Code Execution Vulnerability in FoxCMS Version 1.2.5
CVE-2025-29306

9.8CRITICAL

Key Information:

Vendor

FoxCMS

Status
Vendor
CVE Published:
27 March 2025

Badges

πŸ“ˆ Score: 399πŸ‘Ύ Exploit Exists🟣 EPSS 85%

What is CVE-2025-29306?

CVE-2025-29306 is a remote code execution vulnerability in FoxCMS version 1.2.5, a content management system designed to facilitate website creation and management. This flaw allows remote attackers to execute arbitrary code through the case display page in the index.html component. The implications of this vulnerability are severe, as successful exploitation can lead to unauthorized access, data compromise, and potential disruption of services for organizations relying on FoxCMS for their online presence.

Technical Details

The vulnerability arises from insufficient input validation in the index.html component of FoxCMS version 1.2.5. Malicious actors can leverage this flaw by sending crafted requests to the case display page, leading to the execution of arbitrary code on the server. This vulnerability highlights critical weaknesses in the application's ability to securely process user inputs, making it crucial for organizations to address it promptly.

Potential impact of CVE-2025-29306

  1. Unauthorized access and control: Attackers can gain control over vulnerable systems, enabling them to manipulate data, install malware, or use the server for unauthorized purposes.

  2. Data compromise: Exploiting this vulnerability could lead to the exposure of sensitive information stored within the CMS, resulting in potential data breaches and loss of customer trust.

  3. Service disruption: Malicious exploitation may lead to disruptions in service, affecting the availability of websites managed by FoxCMS and resulting in potential financial losses and reputational damage for affected organizations.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

References

EPSS Score

85% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.