The file mexcel.php in the Vfront 0.99.52 codebase contains a vulnerable call to unserialize(base64_decode($_POST['mexcel'])), where $_POST['mexcel'] is user-controlled input. This input is decoded from base64 and deserialized without validation or use of the allowed_classes option, allowing an attacker to inject arbitrary PHP objects. This can lead to malicious behavior, such as Remote Code Execution (RCE), SQL Injection, Path Traversal, or Denial of Service, depending on the availability of exploitable classes in the Vfront codebase or its dependencies.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| http://vfront.com |
|
| https://xancatos.org/cve202560641 |
|
History
Mon, 20 Oct 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vfront
Vfront vfront |
|
| Vendors & Products |
Vfront
Vfront vfront |
Thu, 16 Oct 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-89 | |
| Metrics |
cvssV3_1
|
Thu, 16 Oct 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The file mexcel.php in the Vfront 0.99.52 codebase contains a vulnerable call to unserialize(base64_decode($_POST['mexcel'])), where $_POST['mexcel'] is user-controlled input. This input is decoded from base64 and deserialized without validation or use of the allowed_classes option, allowing an attacker to inject arbitrary PHP objects. This can lead to malicious behavior, such as Remote Code Execution (RCE), SQL Injection, Path Traversal, or Denial of Service, depending on the availability of exploitable classes in the Vfront codebase or its dependencies. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-10-16T00:00:00.000Z
Updated: 2025-10-16T19:42:22.484Z
Reserved: 2025-09-26T00:00:00.000Z
Link: CVE-2025-60641
Updated: 2025-10-16T19:42:18.303Z
Status : Awaiting Analysis
Published: 2025-10-16T18:15:37.183
Modified: 2025-10-21T19:31:50.020
Link: CVE-2025-60641
No data.
ReportizFlow