Cyber Posture

CVE-2025-31103

High

Published: 31 March 2025

Published
31 March 2025
Modified
13 May 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS Score 0.0043 62.8th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may backdoor web servers with web shells to establish persistent access to systems.

Security Summary

CVE-2025-31103, published on 2025-03-31, is an untrusted data deserialization vulnerability in a-blog CMS, classified under CWE-502. The flaw allows processing of a specially crafted request to store arbitrary files on the server where the product is running. This can be leveraged to execute arbitrary scripts on the server, earning a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).

Unauthenticated attackers can exploit the vulnerability remotely over the network with low attack complexity and no user interaction required. Successful exploitation enables arbitrary file storage and subsequent script execution on the server, resulting in high integrity impact without affecting confidentiality or availability.

Vendor advisories at https://developer.a-blogcms.jp/blog/news/entry-4197.html and https://developer.a-blogcms.jp/blog/news/security-update202503.html, along with JVN details at https://jvn.jp/en/jp/JVN66982699/, provide information on security updates and mitigation steps.

Details

CWE(s)
CWE-502

Affected Products

appleple
a-blog cms
≤ 2.8.80 · 2.9.0 — 2.9.46 · 2.10.0 — 2.10.58

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

The unauthenticated remote deserialization flaw in public-facing a-blog CMS directly enables exploitation of the web application (T1190) and deployment of arbitrary scripts/files for server-side execution (T1505.003).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References