CVE-2025-5552

A vulnerability was found in ChestnutCMS up to 15.1. It has been declared as critical. This vulnerability affects unknown code of the file /dev-api/groovy/exec of the component API Endpoint. The manipulation leads to deserialization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/byxs0x0/cve/issues/7 Exploit Issue Tracking
https://vuldb.com/?ctiid.311002 Permissions Required VDB Entry
https://vuldb.com/?id.311002 Third Party Advisory VDB Entry
https://vuldb.com/?submit.587199 Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:1000mz:chestnutcms:-:*:*:*:*:*:*:*

History

18 Nov 2025, 17:03

Type Values Removed Values Added
CPE cpe:2.3:a:1000mz:chestnutcms:*:*:*:*:*:*:*:* cpe:2.3:a:1000mz:chestnutcms:-:*:*:*:*:*:*:*
References () https://vuldb.com/?submit.587199 - Third Party Advisory, VDB Entry, Exploit () https://vuldb.com/?submit.587199 - Exploit, Third Party Advisory, VDB Entry

Information

Published : 2025-06-04 03:15

Updated : 2025-11-18 17:03


NVD link : CVE-2025-5552

Mitre link : CVE-2025-5552

CVE.ORG link : CVE-2025-5552


JSON object : View

Products Affected

1000mz

  • chestnutcms
CWE
CWE-20

Improper Input Validation

CWE-502

Deserialization of Untrusted Data

NVD-CWE-noinfo