CVE-2025-32101 Scanner

CVE-2025-32101 – PHP Object Injection in UNA CMS 14.0.0-RC

Short Info


Level

High

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

8 days 10 hours

Scan only one

Domain, Subdomain, IPv4

Toolbox

-

UNA CMS is a flexible content management platform often used for creating social networks, communities, and collaboration platforms. A critical vulnerability has been identified in version 14.0.0-RC of UNA CMS, where the `profile_id` parameter in the `/menu.php` endpoint is passed unsanitized to the PHP `unserialize()` function.

This flaw, located within the `BxBaseMenuSetAclLevel::getCode()` method in `/template/scripts/BxBaseMenuSetAclLevel.php`, allows for injection of malicious serialized PHP objects. Exploiting this vulnerability can result in arbitrary file creation, execution of malicious payloads, and full remote code execution (RCE).

The PoC demonstrates an attack leveraging the Guzzle PHP package's `FileCookieJar` and `SetCookie` classes to write a malicious PHP web shell to the `cache_public` directory. Once written, the attacker can trigger remote code execution by issuing a GET request to the web shell, passing arbitrary system commands encoded in base64 via a custom header.

As the attack requires no authentication and can lead to full server compromise, this vulnerability is considered critical and should be addressed immediately.

REFERENCES

Get started to protecting your Free Full Security Scan