CVE-2025-47916

Invision Community 5.0.0 before 5.0.7 allows remote code execution via crafted template strings to themeeditor.php. The issue lies within the themeeditor controller (file: /applications/core/modules/front/system/themeeditor.php), where a protected method named customCss can be invoked by unauthenticated users. This method passes the value of the content parameter to the Theme::makeProcessFunction() method; hence it is evaluated by the template engine. Accordingly, this can be exploited by unauthenticated attackers to inject and execute arbitrary PHP code by providing crafted template strings.
References
Link Resource
https://invisioncommunity.com/release-notes-v5/507-r41/ Release Notes
https://karmainsecurity.com/KIS-2025-02 Exploit Third Party Advisory
http://seclists.org/fulldisclosure/2025/May/4 Mailing List Third Party Advisory
https://karmainsecurity.com/KIS-2025-02 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:invisioncommunity:invisioncommunity:*:*:*:*:*:*:*:*

History

20 Jun 2025, 17:42

Type Values Removed Values Added
First Time Invisioncommunity invisioncommunity
Invisioncommunity
References () https://invisioncommunity.com/release-notes-v5/507-r41/ - () https://invisioncommunity.com/release-notes-v5/507-r41/ - Release Notes
References () https://karmainsecurity.com/KIS-2025-02 - () https://karmainsecurity.com/KIS-2025-02 - Exploit, Third Party Advisory
References () http://seclists.org/fulldisclosure/2025/May/4 - () http://seclists.org/fulldisclosure/2025/May/4 - Mailing List, Third Party Advisory
CPE cpe:2.3:a:invisioncommunity:invisioncommunity:*:*:*:*:*:*:*:*
CWE CWE-94

19 May 2025, 13:35

Type Values Removed Values Added
Summary
  • (es) Invision Community 5.0.0 anterior a 5.0.7 permite la ejecución remota de código mediante cadenas de plantillas manipuladas en themeeditor.php. El problema reside en el controlador themeeditor (archivo: /applications/core/modules/front/system/themeeditor.php), donde usuarios no autenticados pueden invocar un método protegido llamado customCss. Este método pasa el valor del parámetro content al método Theme::makeProcessFunction(); por lo tanto, lo evalúa el motor de plantillas. Por lo tanto, atacantes no autenticados pueden aprovechar esto para inyectar y ejecutar código PHP arbitrario mediante cadenas de plantillas manipuladas.

17 May 2025, 05:15

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2025/May/4 -

16 May 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-16 15:15

Updated : 2025-06-20 17:42


NVD link : CVE-2025-47916

Mitre link : CVE-2025-47916

CVE.ORG link : CVE-2025-47916


JSON object : View

Products Affected

invisioncommunity

  • invisioncommunity
CWE
CWE-1336

Improper Neutralization of Special Elements Used in a Template Engine

CWE-94

Improper Control of Generation of Code ('Code Injection')