CVE-2025-61505

e107 CMS thru 2.3.3 are vulnerable to insecure deserialization in the `install.php` script. The script processes user-controlled input in the `previous_steps` POST parameter using `unserialize(base64_decode())` without validation, allowing attackers to craft malicious serialized data. This could lead to remote code execution, arbitrary file operations, or denial of service, depending on available PHP object gadgets in the codebase.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:e107:e107:*:*:*:*:*:*:*:*

History

12 Jan 2026, 16:36

Type Values Removed Values Added
References () https://github.com/e107inc/e107/blob/master/install.php - () https://github.com/e107inc/e107/blob/master/install.php - Product
References () https://xancatos.org/cve202561505 - () https://xancatos.org/cve202561505 - Mitigation, Third Party Advisory
First Time E107
E107 e107
CPE cpe:2.3:a:e107:e107:*:*:*:*:*:*:*:*

10 Oct 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-10 19:15

Updated : 2026-01-12 16:36


NVD link : CVE-2025-61505

Mitre link : CVE-2025-61505

CVE.ORG link : CVE-2025-61505


JSON object : View

Products Affected

e107

  • e107
CWE
CWE-502

Deserialization of Untrusted Data