CVE-2025-8227

MEDIUM

Chancms < 3.1.3 - Insecure Deserialization

Title source: rule
STIX 2.1

Description

A vulnerability was found in yanyutao0402 ChanCMS up to 3.1.2. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /collect/getArticle. The manipulation of the argument taskUrl leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.3 is able to address this issue. The patch is named 33d9bb464353015aaaba84e27638ac9a3912795d. It is recommended to upgrade the affected component.

References (6)

Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry technical-description
https://vuldb.com/?id.317815
Permissions Required, VDB Entry signature permissions-required
https://vuldb.com/?ctiid.317815
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.622169

Scores

CVSS v3 6.3
EPSS 0.0022
EPSS Percentile 44.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-20 CWE-502
Status published
Products (1)
chancms/chancms < 3.1.3
Published Jul 27, 2025
Tracked Since Feb 18, 2026