8.8
CVSSv3

CVE-2022-25018

Published: 01/03/2022 Updated: 09/03/2022
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

Pluxml v5.8.7 exists to allow malicious users to execute arbitrary code via crafted PHP code inserted into static pages.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

pluxml pluxml 5.8.7

Vendor Advisories

Debian Bug report logs - #1008264 Multiple security issues Package: src:pluxml; Maintainer for src:pluxml is Tanguy Ortolo <tanguy+debian@ortoloeu>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Fri, 25 Mar 2022 16:33:02 UTC Severity: grave Tags: security, upstream Found in version pluxml/56-1 Reply ...

Github Repositories

PluXml 587 RCE Used for practice on CTF machine, requires valid credentials References nvdnistgov/vuln/detail/CVE-2022-25018 githubcom/MoritzHuppert/CVE-2022-25018/blob/main/CVE-2022-25018pdf