baserCMS Pre-Auth Arbitrary Code Execution via Zip Upload (CVE-2025-32957)
baserCMS versions prior to 5.2.3 are vulnerable to arbitrary code execution via a crafted zip file upload through the restore function, leading to unauthenticated remote command execution on the webserver.
baserCMS, a website development framework, contains an arbitrary code execution vulnerability in versions prior to 5.2.3. The vulnerability, identified as CVE-2025-32957, lies within the application’s restore function. This function allows users, including potentially unauthenticated users depending on configuration, to upload a .zip file. The uploaded archive is automatically extracted by the application. A PHP file within the extracted archive is then included using require_once without…
Detection coverage 2
Detect baserCMS Restore Function Access
mediumDetects access to the baserCMS restore function, potentially indicating an attempted exploit of CVE-2025-32957.
Detect PHP Execution from Temporary Directory (baserCMS Exploit)
highDetects PHP execution from a temporary directory, which might indicate exploitation of CVE-2025-32957 in baserCMS.
Detection queries are kept inside the platform. Get full rules →
Indicators of compromise
1
3
url