A PHP object injection vulnerability exists in SugarCRM versions prior to 6.5.24, 6.7.13, 7.5.2.5, 7.6.2.2, and 7.7.1.0 due to improper validation of PHP serialized input in the SugarRestSerialize.php script. The vulnerable code fails to sanitize the rest_data parameter before passing it to the unserialize() function. This allows an unauthenticated attacker to submit crafted serialized data containing malicious object declarations, resulting in arbitrary code execution within the application context. Although SugarCRM released a prior fix in advisory sugarcrm-sa-2016-001, the patch was incomplete and failed to address some vectors.
CVSS
No CVSS.
References
Configurations
No configuration.
History
23 Jun 2025, 20:16
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
20 Jun 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-20 19:15
Updated : 2025-06-23 20:16
NVD link : CVE-2025-25034
Mitre link : CVE-2025-25034
CVE.ORG link : CVE-2025-25034
JSON object : View
Products Affected
No product.
CWE
CWE-502
Deserialization of Untrusted Data