Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vwg9-2rf4-w4xc

Опубликовано: 31 дек. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 2.1
CVSS3: 6.3

Описание

A flaw has been found in EyouCMS up to 1.7.7. The impacted element is the function unserialize of the file application/api/controller/Ajax.php of the component arcpagelist Handler. Executing manipulation of the argument attstr can lead to deserialization. The attack can be launched remotely. The exploit has been published and may be used. The vendor is "[a]cknowledging the existence of the vulnerability, we have completed the fix and will release a new version, v1.7.8".

A flaw has been found in EyouCMS up to 1.7.7. The impacted element is the function unserialize of the file application/api/controller/Ajax.php of the component arcpagelist Handler. Executing manipulation of the argument attstr can lead to deserialization. The attack can be launched remotely. The exploit has been published and may be used. The vendor is "[a]cknowledging the existence of the vulnerability, we have completed the fix and will release a new version, v1.7.8".

EPSS

Процентиль: 15%
0.00049
Низкий

2.1 Low

CVSS4

6.3 Medium

CVSS3

Дефекты

CWE-20
CWE-502

Связанные уязвимости

CVSS3: 6.3
nvd
около 1 месяца назад

A flaw has been found in EyouCMS up to 1.7.7. The impacted element is the function unserialize of the file application/api/controller/Ajax.php of the component arcpagelist Handler. Executing manipulation of the argument attstr can lead to deserialization. The attack can be launched remotely. The exploit has been published and may be used. The vendor is "[a]cknowledging the existence of the vulnerability, we have completed the fix and will release a new version, v1.7.8".

EPSS

Процентиль: 15%
0.00049
Низкий

2.1 Low

CVSS4

6.3 Medium

CVSS3

Дефекты

CWE-20
CWE-502