CVE-2025-25789
Published: 26 February 2025
Summary
CVE-2025-25789 is a critical-severity Code Injection (CWE-94) vulnerability in Foxcms Foxcms. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 15.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the RCE vulnerability by requiring timely patching or updating of FoxCMS to remediate the flawed index() method in Sitemap.php.
Enforces validation and sanitization of inputs to the Sitemap controller's index() method, preventing code injection exploits (CWE-94) that lead to unauthenticated RCE.
Deploys boundary protections like web application firewalls to monitor and block remote exploitation attempts targeting the vulnerable Sitemap.php endpoint.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct unauthenticated RCE in public-facing web app component enables initial access via exploitation of public-facing application.
NVD Description
FoxCMS v1.2.5 was discovered to contain a remote code execution (RCE) vulnerability via the index() method at \controller\Sitemap.php.
Deeper analysisAI
CVE-2025-25789 is a remote code execution (RCE) vulnerability (CWE-94) in FoxCMS version 1.2.5, published on 2025-02-26. The flaw exists in the index() method within the \controller\Sitemap.php component, earning a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Unauthenticated attackers with network access can exploit this vulnerability remotely with low attack complexity and no user interaction required. Successful exploitation grants high-impact control over confidentiality, integrity, and availability, enabling arbitrary code execution on the affected system.
Advisories and further details are available via references including http://foxcms.com, https://www.foxcms.cn/, and https://github.com/Ka7arotto/FoxCMS/blob/main/FoxCMS-rce3.md.
Details
- CWE(s)