The file mexcel.php in the Vfront 0.99.52 codebase contains a vulnerable call to unserialize(base64_decode($_POST['mexcel'])), where $_POST['mexcel'] is user-controlled input. This input is decoded from base64 and deserialized without validation or use of the allowed_classes option, allowing an attacker to inject arbitrary PHP objects. This can lead to malicious behavior, such as Remote Code Execution (RCE), SQL Injection, Path Traversal, or Denial of Service, depending on the availability of exploitable classes in the Vfront codebase or its dependencies.
History

Mon, 20 Oct 2025 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Vfront
Vfront vfront
Vendors & Products Vfront
Vfront vfront

Thu, 16 Oct 2025 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-89
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 16 Oct 2025 18:00:00 +0000

Type Values Removed Values Added
Description The file mexcel.php in the Vfront 0.99.52 codebase contains a vulnerable call to unserialize(base64_decode($_POST['mexcel'])), where $_POST['mexcel'] is user-controlled input. This input is decoded from base64 and deserialized without validation or use of the allowed_classes option, allowing an attacker to inject arbitrary PHP objects. This can lead to malicious behavior, such as Remote Code Execution (RCE), SQL Injection, Path Traversal, or Denial of Service, depending on the availability of exploitable classes in the Vfront codebase or its dependencies.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-10-16T00:00:00.000Z

Updated: 2025-10-16T19:42:22.484Z

Reserved: 2025-09-26T00:00:00.000Z

Link: CVE-2025-60641

cve-icon Vulnrichment

Updated: 2025-10-16T19:42:18.303Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-16T18:15:37.183

Modified: 2025-10-21T19:31:50.020

Link: CVE-2025-60641

cve-icon Redhat

No data.