A security vulnerability has been detected in EyouCMS up to 1.7.7. Impacted is the function saveRemote of the file application/function.php. Such manipulation leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. The vendor is "[a]cknowledging the existence of the vulnerability, we have completed the fix and will release a new version, v1.7.8".
References
| Link | Resource |
|---|---|
| https://note-hxlab.wetolink.com/share/DeUFyoSjsPPK | Exploit Third Party Advisory |
| https://note-hxlab.wetolink.com/share/DeUFyoSjsPPK#-span--strong-proof-of-concept---strong---span- | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.339081 | Permissions Required VDB Entry |
| https://vuldb.com/?id.339081 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.718465 | Third Party Advisory VDB Entry |
| https://note-hxlab.wetolink.com/share/DeUFyoSjsPPK | Exploit Third Party Advisory |
| https://note-hxlab.wetolink.com/share/DeUFyoSjsPPK#-span--strong-proof-of-concept---strong---span- | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-12-31 04:15
Updated : 2026-01-02 15:15
NVD link : CVE-2025-15373
Mitre link : CVE-2025-15373
CVE.ORG link : CVE-2025-15373
JSON object : View
Products Affected
eyoucms
- eyoucms
CWE
CWE-918
Server-Side Request Forgery (SSRF)
