CVE-2025-64050
Description
A Remote Code Execution (RCE) vulnerability in the template management component in REDAXO CMS 5.20.0 allows remote authenticated administrators to execute arbitrary operating system commands by injecting PHP code into an active template. The payload is executed when visitors access frontend pages using the compromised template.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2025-64050 is a critical RCE in REDAXO CMS 5.20.0 allowing authenticated admins to execute OS commands via PHP injection in active templates, triggered on frontend page loads.
Vulnerability
Overview
CVE-2025-64050 is a Remote Code Execution (RCE) vulnerability in the template management component of REDAXO CMS version 5.20.0. The root cause is the lack of input sanitization or validation when administrators edit active templates, allowing injection of arbitrary PHP code. The injected code is executed server-side when any visitor loads a frontend page that uses the compromised template [1][2][4].
Exploitation
Prerequisites and Attack Surface
Exploitation requires an authenticated session with administrative privileges in the REDAXO backend. The attacker navigates to the template management page, selects an active template, and inserts a PHP payload (e.g., using shell_execshell_exec` or system`) into the template content. After saving, the payload is triggered automatically when any user (including unauthenticated visitors) accesses the site's frontend pages that rely on that template [2][4]. No additional user interaction is needed beyond the initial admin action.
Impact
Successful exploitation grants the attacker arbitrary operating system command execution in the context of the web server user. This can lead to full system compromise, including file disclosure (e.g., reading /etc/passwd), data theft from databases and configuration files, establishment of reverse shells for persistent remote access, and potential privilege escalation within the hosting environment [4].
Mitigation
Status
As of the publication date, no official patch has been released for REDAXO CMS 5.20.0. The vulnerability is publicly documented with proof-of-concept exploit steps [4]. Administrators should restrict backend access to trusted users, monitor template modifications, and apply any security updates from the vendor as soon as they become available. The CVE is not yet listed in CISA's KEV catalog.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
redaxo/sourcePackagist | < 5.20.1 | 5.20.1 |
Affected products
2- REDAXO/REDAXO CMSdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-xj9j-gjxg-7jvqghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-64050ghsaADVISORY
- drive.google.com/drive/folders/1Via4r4wn5zCcBllWmHpxYweCPgcbN0bzghsaWEB
- github.com/redaxo/redaxo/pull/6372/commits/bc96462e20f7e651b2e6c3bb59d141d5cb09af0fghsaWEB
- github.com/vettrivel007/CVE-Disclosures/blob/main/CVE-2025-64050.mdghsaWEB
News mentions
0No linked articles in our index yet.