CVE-2025-3563

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-3563
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-3563.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-3563
Published
2025-04-14T11:15:15Z
Modified
2025-05-17T14:08:13.976957Z
Severity
  • 7.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability was found in WuzhiCMS 4.1. It has been rated as critical. Affected by this issue is the function Set of the file /index.php?m=attachment&f=index&_su=wuzhicms&v=set&submit=1 of the component Setting Handler. The manipulation of the argument Setting leads to code injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

References

Affected packages

Git / github.com/wuzhicms/wuzhicms

Affected ranges

Type
GIT
Repo
https://github.com/wuzhicms/wuzhicms
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

v2.*

v2.0.1
v2.0.4
v2.0.5
v2.1.2
v2.1.3
v2.1.6
v2.1.7

v3.*

v3.0.1
v3.0.3
v3.0.3.0
v3.0.4
v3.0.4.0
v3.1.0
v3.1.0.1
v3.1.0.2
v3.1.1
v3.1.2
v3.1.3

v4.*

v4.0.0
v4.1.0