提交 #713989: PluXml 5.8.22 Deserialization Vulnerability信息

标题PluXml 5.8.22 Deserialization Vulnerability
描述PluXml CMS version 5.8.22 and earlier contains a critical backend deserialization vulnerability that allows authenticated attackers to achieve remote code execution. The vulnerability stems from improper handling of user-controlled file parameters in the media management module (core/admin/medias.php), which triggers PHP stream wrapper processing during file operations. By uploading a malicious Phar archive disguised as an image file and then triggering deserialization through the file rename functionality using a phar:// protocol path, attackers can exploit a gadget chain in the bundled Guzzle HTTP library (FileCookieJar::__destruct() → save()) to write arbitrary PHP code to the server, resulting in remote code execution.
来源⚠️ https://note-hxlab.wetolink.com/share/9SJUnaDcJuqz
用户
 V3geD4g (UID 60725)
提交2025-12-12 08時12分 (4 月前)
管理2026-01-02 10時57分 (21 days later)
状态已接受
VulDB条目339383 [PluXml 直到 5.8.22 Media Management core/admin/medias.php __destruct 文件 权限提升]
积分20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!