CVE-2025-11138
Published: 29 September 2025
Summary
CVE-2025-11138 is a medium-severity Command Injection (CWE-77) vulnerability in Wenkucms Project Wenkucms. Its CVSS base score is 6.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Unix Shell (T1059.004); ranked at the 49.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
OS command injection in public-facing web app (wenkucms) allows remote authenticated RCE via Unix shell (bash reverse shell PoC), mapping to Unix Shell execution, exploitation of public-facing application, and indirect command execution as noted in advisory.
NVD Description
A vulnerability was found in mirweiye wenkucms up to 3.4. This impacts the function createPathOne of the file app/common/common.php. The manipulation results in os command injection. The attack may be launched remotely. The exploit has been made public and could…
more
be used.
Deeper analysisAI
CVE-2025-11138 is an OS command injection vulnerability (CWE-77, CWE-78) in mirweiye wenkucms versions up to 3.4. The flaw affects the createPathOne function in the file app/common/common.php, where manipulation enables command injection. Published on 2025-09-29, it carries a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
An attacker with low privileges, such as an authenticated user, can exploit this remotely with low complexity and no user interaction required. Successful exploitation allows limited impacts on confidentiality, integrity, and availability via OS command execution.
Advisories referenced in VulDB entries (ctiid.326215, id.326215, submit.657055) and a GitHub issue (electroN1chahaha/wenkucms-RCE/issues/1) confirm the remote attack vector. The exploit has been made public and could be used. No specific patch or mitigation details are detailed in the available information.
Details
- CWE(s)