Cyber Posture

CVE-2025-25789

CriticalPublic PoCRCE

Published: 26 February 2025

Published
26 February 2025
Modified
09 April 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0227 84.8th percentile
Risk Priority 21 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-25789 is a critical-severity Code Injection (CWE-94) vulnerability in Foxcms Foxcms. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 15.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the RCE vulnerability by requiring timely patching or updating of FoxCMS to remediate the flawed index() method in Sitemap.php.

prevent

Enforces validation and sanitization of inputs to the Sitemap controller's index() method, preventing code injection exploits (CWE-94) that lead to unauthenticated RCE.

preventdetect

Deploys boundary protections like web application firewalls to monitor and block remote exploitation attempts targeting the vulnerable Sitemap.php endpoint.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Direct unauthenticated RCE in public-facing web app component enables initial access via exploitation of public-facing application.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

FoxCMS v1.2.5 was discovered to contain a remote code execution (RCE) vulnerability via the index() method at \controller\Sitemap.php.

Deeper analysisAI

CVE-2025-25789 is a remote code execution (RCE) vulnerability (CWE-94) in FoxCMS version 1.2.5, published on 2025-02-26. The flaw exists in the index() method within the \controller\Sitemap.php component, earning a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Unauthenticated attackers with network access can exploit this vulnerability remotely with low attack complexity and no user interaction required. Successful exploitation grants high-impact control over confidentiality, integrity, and availability, enabling arbitrary code execution on the affected system.

Advisories and further details are available via references including http://foxcms.com, https://www.foxcms.cn/, and https://github.com/Ka7arotto/FoxCMS/blob/main/FoxCMS-rce3.md.

Details

CWE(s)

Affected Products

foxcms
foxcms
1.2.5

CVEs Like This One

CVE-2025-50692Same product: Foxcms Foxcms
CVE-2025-29306Same product: Foxcms Foxcms
CVE-2025-55409Same product: Foxcms Foxcms
CVE-2025-25790Same product: Foxcms Foxcms
CVE-2025-55420Same product: Foxcms Foxcms
CVE-2025-23209Shared CWE-94
CVE-2026-39440Shared CWE-94
CVE-2026-3300Shared CWE-94
CVE-2025-6389Shared CWE-94
CVE-2025-8723Shared CWE-94

References