CVE-2025-14837

A vulnerability has been found in ZZCMS 2025. Affected by this issue is the function stripfxg of the file /admin/siteconfig.php of the component Backend Website Settings Module. Such manipulation of the argument icp leads to code injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://note-hxlab.wetolink.com/share/ekNgcv2wVBya Exploit Third Party Advisory
https://vuldb.com/?ctiid.336987 Permissions Required VDB Entry
https://vuldb.com/?id.336987 Third Party Advisory VDB Entry
https://vuldb.com/?submit.711655 Third Party Advisory VDB Entry
https://note-hxlab.wetolink.com/share/ekNgcv2wVBya Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:zzcms:zzcms:2025:*:*:*:*:*:*:*

History

30 Dec 2025, 18:27

Type Values Removed Values Added
CPE cpe:2.3:a:zzcms:zzcms:2025:*:*:*:*:*:*:*
First Time Zzcms
Zzcms zzcms
References () https://note-hxlab.wetolink.com/share/ekNgcv2wVBya - () https://note-hxlab.wetolink.com/share/ekNgcv2wVBya - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.336987 - () https://vuldb.com/?ctiid.336987 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.336987 - () https://vuldb.com/?id.336987 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.711655 - () https://vuldb.com/?submit.711655 - Third Party Advisory, VDB Entry

18 Dec 2025, 19:16

Type Values Removed Values Added
References () https://note-hxlab.wetolink.com/share/ekNgcv2wVBya - () https://note-hxlab.wetolink.com/share/ekNgcv2wVBya -

18 Dec 2025, 00:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-18 00:16

Updated : 2025-12-30 18:27


NVD link : CVE-2025-14837

Mitre link : CVE-2025-14837

CVE.ORG link : CVE-2025-14837


JSON object : View

Products Affected

zzcms

  • zzcms
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-94

Improper Control of Generation of Code ('Code Injection')