# N/A
## 漏洞概述
Invision Community 5.0.0至5.0.7版本中存在远程代码执行漏洞。通过精心构造的模板字符串,攻击者可以通过`themeeditor.php`页面执行任意PHP代码。
## 影响版本
- Invision Community 5.0.0至Invision Community 5.0.7
## 漏洞细节
漏洞位于`themeeditor`控制器(文件路径:`/applications/core/modules/front/system/themeeditor.php`)中的`customCss`方法。该方法可以被未认证用户调用,并将`content`参数的值传递给`Theme::makeProcessFunction()`方法,从而使其通过模板引擎进行解析。利用此机制,未认证攻击者可以通过提供精心构造的模板字符串注入并执行任意PHP代码。
## 影响
此漏洞允许攻击者在目标服务器上执行任意PHP代码,从而可能导致远程代码执行。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | Invision Community 5.0.0 before 5.0.7 allows remote code execution via crafted template strings to themeeditor.php. The issue lies within the themeeditor controller (/applications/core/modules/front/system/themeeditor.php), where a protected method named customCss can be invoked by unauthenticated users. This method passes the value of the content parameter to the Theme::makeProcessFunction() method, which is evaluated by the template engine. Accordingly, unauthenticated attackers can inject and execute arbitrary PHP code by providing crafted template strings. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-47916.yaml | POC详情 |
标题: Invision Community <= 5.0.6 (customCss) Remote Code Execution Vulnerability | Karma(In)Security -- 🔗来源链接
标签:
神龙速读