CVE-2025-15375

A flaw has been found in EyouCMS up to 1.7.7. The impacted element is the function unserialize of the file application/api/controller/Ajax.php of the component arcpagelist Handler. Executing a manipulation of the argument attstr can lead to deserialization. The attack can be launched remotely. The exploit has been published and may be used. The vendor is "[a]cknowledging the existence of the vulnerability, we have completed the fix and will release a new version, v1.7.8".
Configurations

Configuration 1 (hide)

cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*

History

24 Feb 2026, 07:17

Type Values Removed Values Added
Summary (en) A flaw has been found in EyouCMS up to 1.7.7. The impacted element is the function unserialize of the file application/api/controller/Ajax.php of the component arcpagelist Handler. Executing manipulation of the argument attstr can lead to deserialization. The attack can be launched remotely. The exploit has been published and may be used. The vendor is "[a]cknowledging the existence of the vulnerability, we have completed the fix and will release a new version, v1.7.8". (en) A flaw has been found in EyouCMS up to 1.7.7. The impacted element is the function unserialize of the file application/api/controller/Ajax.php of the component arcpagelist Handler. Executing a manipulation of the argument attstr can lead to deserialization. The attack can be launched remotely. The exploit has been published and may be used. The vendor is "[a]cknowledging the existence of the vulnerability, we have completed the fix and will release a new version, v1.7.8".

02 Jan 2026, 15:15

Type Values Removed Values Added
References () https://note-hxlab.wetolink.com/share/2wLgcbKe9Toh - Exploit, Third Party Advisory () https://note-hxlab.wetolink.com/share/2wLgcbKe9Toh - Exploit, Third Party Advisory
References () https://note-hxlab.wetolink.com/share/2wLgcbKe9Toh#-span--strong-proof-of-concept---strong---span- - Exploit, Third Party Advisory () https://note-hxlab.wetolink.com/share/2wLgcbKe9Toh#-span--strong-proof-of-concept---strong---span- - Exploit, Third Party Advisory

31 Dec 2025, 21:49

Type Values Removed Values Added
References () https://note-hxlab.wetolink.com/share/2wLgcbKe9Toh - () https://note-hxlab.wetolink.com/share/2wLgcbKe9Toh - Exploit, Third Party Advisory
References () https://note-hxlab.wetolink.com/share/2wLgcbKe9Toh#-span--strong-proof-of-concept---strong---span- - () https://note-hxlab.wetolink.com/share/2wLgcbKe9Toh#-span--strong-proof-of-concept---strong---span- - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.339083 - () https://vuldb.com/?ctiid.339083 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.339083 - () https://vuldb.com/?id.339083 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.718481 - () https://vuldb.com/?submit.718481 - Third Party Advisory, VDB Entry
First Time Eyoucms
Eyoucms eyoucms
CPE cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*

31 Dec 2025, 05:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-31 05:16

Updated : 2026-02-24 07:17


NVD link : CVE-2025-15375

Mitre link : CVE-2025-15375

CVE.ORG link : CVE-2025-15375


JSON object : View

Products Affected

eyoucms

  • eyoucms
CWE
CWE-20

Improper Input Validation

CWE-502

Deserialization of Untrusted Data