CVE-2025-34292

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-34292
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-34292.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-34292
Published
2025-10-27T15:15:38.317Z
Modified
2025-11-20T12:36:15.175240Z
Severity
  • 9.4 (Critical) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
[none]
Details

Rox, the software running BeWelcome, contains a PHP object injection vulnerability resulting from deserialization of untrusted data. User-controlled input is passed to PHP's unserialize(): the POST parameter formkit_memory_recovery in \RoxPostHandler::getCallbackAction and the 'memory cookie' read by \RoxModelBase::getMemoryCookie (bwRemember). (1) If present, formkit_memory_recovery is processed and passed to unserialize(), and (2) restore-from-memory functionality calls unserialize() on the bwRemember cookie value. Gadget chains present in Rox and bundled libraries enable exploitation of object injection to write arbitrary files or achieve remote code execution. Successful exploitation can lead to full site compromise. This vulnerability was remediated with commit c60bf04 (2025-06-16).

References

Affected packages

Git / github.com/bewelcome/rox

Affected ranges

Type
GIT
Repo
https://github.com/bewelcome/rox
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.5.3
v0.5.4
v0.5.5
v0.5.6
v0.5.7
v0.5.8
v0.5.9
v0.7
v0.8
v0.9

v1.*

v1.0
v1.1
v1.2
v1.3
v1.4
v1.5
v1.6
v1.7
v1.8
v1.9

v2.*

v2.0
v2.0.1
v2.0.2
v2.1
v2.1.1
v2.1.5
v2.2
v2.2.1
v2.2.2
v2.2.3
v2.3
v2.3.1
v2.4
v2.4.1
v2.4.2
v2.5
v2.6
v2.6.1
v2.7
v2.7.1

v3.*

v3.0
v3.0.1
v3.0.2