Description
A flaw has been found in EyouCMS up to 1.7.7. The impacted element is the function unserialize of the file application/api/controller/Ajax.php of the component arcpagelist Handler. Executing a manipulation of the argument attstr can lead to deserialization. The attack can be launched remotely. The exploit has been published and may be used. The vendor is "[a]cknowledging the existence of the vulnerability, we have completed the fix and will release a new version, v1.7.8".
Problem types
Timeline
| 2025-12-30: | Advisory disclosed |
| 2025-12-30: | VulDB entry created |
| 2026-01-01: | VulDB entry last update |
Credits
pemic (VulDB User)
References
note-hxlab.wetolink.com/share/2wLgcbKe9Toh
note-hxlab.wetolink.com/share/2wLgcbKe9Toh
vuldb.com/?id.339083 (VDB-339083 | EyouCMS arcpagelist Ajax.php unserialize deserialization)
vuldb.com/?ctiid.339083 (VDB-339083 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.718481 (Submit #718481 | EyouCMS 1.7.7 Deserialization)
note-hxlab.wetolink.com/share/2wLgcbKe9Toh
note-hxlab.wetolink.com/share/2wLgcbKe9Toh