CVE-2025-50692
Published: 07 August 2025
Summary
CVE-2025-50692 is a critical-severity Code Injection (CWE-94) vulnerability in Foxcms Foxcms. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 41.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the code execution vulnerability by requiring timely patching or workaround application for FoxCMS <=v1.2.5.
Prevents arbitrary code injection in the admin/template_file/editFile.html component through rigorous input validation and sanitization.
Boundary protection mechanisms like web application firewalls can block exploitation attempts targeting the unauthenticated remote code execution endpoint.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct remote code execution flaw in a public-facing CMS component (CWE-94) enables exploitation of public-facing applications without authentication.
NVD Description
FoxCMS <=v1.2.5 is vulnerable to Code Execution in admin/template_file/editFile.html.
Deeper analysisAI
CVE-2025-50692 is a code execution vulnerability (CWE-94) affecting FoxCMS versions up to and including 1.2.5. The flaw is located in the admin/template_file/editFile.html component, enabling improper handling that leads to arbitrary code execution. Published on 2025-08-07, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical due to its high impact on confidentiality, integrity, and availability.
Remote attackers require no privileges or user interaction to exploit this vulnerability over the network with low complexity. Successful exploitation allows attackers to execute arbitrary code on the affected system, potentially leading to full server compromise.
References include GitHub gists at https://gist.github.com/cyb3res3c/ceacf7d560d2c8cd5ffd158abf0bfba9 (listed twice) and https://reference1.example.com/index.php/admin/template_file/editFile.html, which likely provide details on the vulnerability and reproduction steps, though specific mitigation or patch guidance is not detailed in the available information.
Details
- CWE(s)