Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-29306 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: FoxCMS v1.2.5 suffers from a **Service Parameter Injection** vulnerability in the `index.html` component.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: Insecure parameter parsing in the `id` parameter. The system fails to sanitize inputs containing `${@print()}` expressions, allowing direct **Code Execution** via injection.…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: **FoxCMS (FOXCMS)** versions **1.2** and **1.2.5**. 🌐 It is an open-source PHP+MySQL content management system by Chinese company Qianhu (FoxCMS).

Q4What can hackers do? (Privileges/Data)

πŸ”“ **Attacker Capabilities**: Full **Remote Code Execution (RCE)**. Hackers can run commands like `phpinfo()`, access sensitive data, and potentially gain **server control** (root/admin privileges).

Q5Is exploitation threshold high? (Auth/Config)

πŸ”‘ **Exploitation Threshold**: **LOW**. No authentication required. It is a **Remote** vulnerability accessible via HTTP requests to `/images/index.html`. 🌍 Anyone on the internet can exploit it.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ’£ **Public Exploits**: **YES**. Multiple PoCs are available on GitHub (e.g., `somatrasss`, `verylazytech`, `nuclei-templates`). Automated scanning tools like Nuclei already have templates.…

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Send a GET request to: `http://[TARGET]/images/index.html?id=${@print(phpinfo())}`. βœ… **Vulnerable** if the response contains PHP info output. ❌ **Safe** if it returns an error or no PHP data.

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Official Fix**: The provided data does **not** mention an official patch or vendor update. ⚠️ As of the publication date (2025-03-27), no fix is confirmed in the text.

Q9What if no patch? (Workaround)

πŸ›‘ **Workaround**: Since no patch exists, **block access** to `/images/index.html` via WAF or firewall rules. 🚫 Restrict input parameters to prevent `${...}` injection patterns.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. It is an **Unauthenticated RCE** with public PoCs. Immediate action is required to prevent server takeover. Prioritize scanning and mitigation NOW. ⏳