CVE-2025-5114

A vulnerability has been found in easysoft zentaopms 21.5_20250307 and classified as critical. This vulnerability affects the function Edit of the file /index.php?m=editor&f=edit&filePath=cGhhcjovLy9ldGMvcGFzc3dk&action=edit of the component Committer. The manipulation of the argument filePath leads to deserialization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Configurations

Configuration 1 (hide)

cpe:2.3:a:easycorp:zentao:21.5_2025-03-07:*:*:*:*:*:*:*

History

05 Dec 2025, 00:16

Type Values Removed Values Added
First Time Easycorp
Easycorp zentao
References () https://github.com/3em0/cve_repo/blob/main/zentaopms/Phar%20Bypass%20Vulnerability%20in%20ZenTao.md - () https://github.com/3em0/cve_repo/blob/main/zentaopms/Phar%20Bypass%20Vulnerability%20in%20ZenTao.md - Exploit, Third Party Advisory, Mitigation
References () https://github.com/3em0/cve_repo/blob/main/zentaopms/Phar%20Bypass%20Vulnerability%20in%20ZenTao.md#exploitation - () https://github.com/3em0/cve_repo/blob/main/zentaopms/Phar%20Bypass%20Vulnerability%20in%20ZenTao.md#exploitation - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.310090 - () https://vuldb.com/?ctiid.310090 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.310090 - () https://vuldb.com/?id.310090 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.570727 - () https://vuldb.com/?submit.570727 - Third Party Advisory, VDB Entry
CPE cpe:2.3:a:easycorp:zentao:21.5_2025-03-07:*:*:*:*:*:*:*
Summary
  • (es) Se ha detectado una vulnerabilidad en easysoft zentaopms 21.5_20250307, clasificada como crítica. Esta vulnerabilidad afecta a la función Edit del archivo /index.php?m=editor&f=edit&filePath=cGhhcjovLy9ldGMvcGFzc3dk&action=edit del componente Committer. La manipulación del argumento filePath provoca la deserialización. El ataque puede ejecutarse en remoto. Se ha hecho público el exploit y puede que sea utilizado. Se contactó al proveedor con antelación para informarle sobre esta divulgación, pero no respondió.

23 May 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-23 15:15

Updated : 2025-12-05 00:16


NVD link : CVE-2025-5114

Mitre link : CVE-2025-5114

CVE.ORG link : CVE-2025-5114


JSON object : View

Products Affected

easycorp

  • zentao
CWE
CWE-20

Improper Input Validation

CWE-502

Deserialization of Untrusted Data