CVE-2025-8266

MEDIUM EXPLOITED NUCLEI

Chancms < 3.1.3 - Insecure Deserialization

Title source: rule

Description

A vulnerability has been found in yanyutao0402 ChanCMS up to 3.1.2 and classified as critical. Affected by this vulnerability is the function getArticle of the file app/modules/cms/controller/collect.js. The manipulation of the argument targetUrl leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.3 is able to address this issue. It is recommended to upgrade the affected component.

Exploits (2)

gitee 613 stars
by chancms · nodejswriteup
https://gitee.com/yanyutao0402/ChanCMS/issues/ICLP61
github WORKING POC
by Acczdy · pythonpoc
https://github.com/Acczdy/CVE-Vault/tree/master/CVE-2025-8266

Nuclei Templates (1)

ChanCMS <= 3.1. - Remote Code Execution
CRITICALVERIFIEDby Ark
Shodan: html:"ChanCMS"

Scores

CVSS v3 6.3
EPSS 0.0065
EPSS Percentile 70.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Details

VulnCheck KEV 2026-03-31
CWE
CWE-502 CWE-20
Status published
Products (1)
chancms/chancms < 3.1.3
Published Jul 28, 2025
Tracked Since Feb 18, 2026