CVE-2025-56422
Published: 10 March 2026
Description
A deserialization vulnerability in LimeSurvey before v6.15.0+250623 allows a remote attacker to execute arbitrary code on the server.
Mitigating Controls (NIST 800-53 r5)AI
Directly requires timely identification, reporting, and remediation of critical software flaws like this deserialization vulnerability via patching to LimeSurvey v6.15.0+250623 or later.
Mandates validation of untrusted inputs to prevent processing of malicious deserialization payloads by remote unauthenticated attackers.
Enables vulnerability scanning and monitoring to identify the deserialization flaw in LimeSurvey instances for prioritized remediation.
Security SummaryAI
CVE-2025-56422 is a deserialization vulnerability (CWE-502) affecting LimeSurvey versions prior to v6.15.0+250623. Published on 2026-03-10, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for high-impact exploitation across confidentiality, integrity, and availability.
The vulnerability enables a remote, unauthenticated attacker to execute arbitrary code on the affected server with low attack complexity and no user interaction required. Exploitation occurs over the network, allowing attackers without privileges to compromise the LimeSurvey instance fully.
Mitigation involves upgrading to LimeSurvey v6.15.0+250623 or later. Additional details are available in advisories from the vendor at http://limesurvey.com and a security advisory at https://github.com/hongancalif/security-advisories/blob/main/CVE-2025-56422.md.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability allows remote unauthenticated arbitrary code execution on a public-facing web application (LimeSurvey), directly mapping to exploitation of public-facing applications for initial access.