Description
A vulnerability was found in yanyutao0402 ChanCMS up to 3.1.2. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /collect/getArticle. The manipulation of the argument taskUrl leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.3 is able to address this issue. The patch is named 33d9bb464353015aaaba84e27638ac9a3912795d. It is recommended to upgrade the affected component.
References (6)
Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry
technical-description
https://vuldb.com/?id.317815
Permissions Required, VDB Entry signature
permissions-required
https://vuldb.com/?ctiid.317815
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.622169
Exploit exploit
issue-tracking
https://gitee.com/yanyutao0402/ChanCMS/issues/ICLP81
Permissions Required patch
https://gitee.com/yanyutao0402/ChanCMS/commit/33d9bb464353015aaaba84e27638ac9a3912795d
Product patch
https://gitee.com/yanyutao0402/ChanCMS/tree/V3.1.3
Scores
CVSS v3
6.3
EPSS
0.0022
EPSS Percentile
44.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-20
CWE-502
Status
published
Products (1)
chancms/chancms
< 3.1.3
Published
Jul 27, 2025
Tracked Since
Feb 18, 2026