[2025.10 Vulnerability Report] PluXml CMS — Theme Editor Authenticated Admin Remote Code Execution (CVE-2025-57567) | SECaaS Platform AIONCLOUD

Threat Intelligence Report

Get up-to-date information on web application vulnerabilities, attacks, and how to respond.

Back to Threat Intelligence Report

[2025.10 Vulnerability Report] PluXml CMS — Theme Editor Authenticated Admin Remote Code Execution (CVE-2025-57567)

PluXml CMS is a widely used content management system (CMS) for personal and small website environments. The recently discovered CVE-2025-57567 vulnerability resides in the theme editor feature within the service's admin panel, allowing an authenticated administrator to inject arbitrary PHP code, potentially leading to remote code execution (RCE).

This vulnerability is extremely dangerous, as a successful attack can result in complete server control. Given the active exploitation of similar attacks, it is possible that this vulnerability was used in an actual attack. Therefore, all customers using PluXml CMS should immediately update to the latest version to protect against potential data leaks and system takeover attacks.

Our TA team is monitoring vulnerabilities in PluXml CMS and other web application services, and we will respond promptly to any additional product vulnerabilities discovered.

Tags: PluXml CMS, CMS, PluXml, CVE-2025-57567, RCE

1. Overview

PluXml CMS is a free, open-source website management system based on PHP and XML architecture. This report analyzes the Authenticated Admin Remote Code Execution (CVE-2025-57567) vulnerability that occurs in the Theme Editor feature, allowing an administrator to manipulate server files and execute arbitrary code.

image.png

Source: https://commons.wikimedia.org/

2. Attack Type

This vulnerability arises when the application processes file modification requests from an authenticated administrator without verifying the safety of the content, allowing executable files on the server to be overwritten.

image.png

Malicious File Creation via Code Injection: PluXml’s theme editor allows administrators to edit and save theme-related files (such as CSS or template files). Attackers can exploit this feature to overwrite legitimate files with malicious PHP code—for example, injecting it into /themes/defaut/css/minify.php to create a web shell. Attackers send a request through the admin panel’s Theme Editor to overwrite the minify.php file. (The actual request includes session cookies and a CSRF token, encoded as form data.)

ex)
POST /core/admin/parametres_edittpl.php HTTP/1.1
Host: your-pluxml-site.com
Cookie: plx_session=...; plx_auth=...
Content-Type: application/x-www-form-urlencoded
Connection: close


Remote Code Execution (RCE): Once the file overwrite is successful, the attacker can directly access the injected PHP file via a browser to execute arbitrary commands on the server. The modified minify.php file now functions as a web shell that runs PHP code and returns the output.

Example:
GET /themes/defaut/css/minify.php?cmd=ls%20-la HTTP/1.1
Host: your-pluxml-site.com
User-Agent: Mozilla/5.0
Connection: close


3. Response

The CVE-2025-57567 vulnerability allows an authenticated administrator to inject PHP code via the Theme Editor, achieving remote code execution. Because this can grant full control of the server, the severity is considered critical.

Immediate actions:
1. Apply the patch immediately: Update PluXml CMS to the latest version.
2. Temporary mitigations: If an immediate update is not possible, implement temporary security measures to minimize risk.

Our AIWAF product detects and mitigates this vulnerability through pattern 1404: Webshell.

4. Conclusion

PluXml CMS is a widely used CMS for small-scale websites.
CVE-2025-57567 occurs in the admin panel’s theme editor and allows authenticated administrators to perform RCE by injecting PHP code.
Since successful exploitation grants full server control and similar attacks are actively exploited, all users must update immediately.
The TA team continuously monitors vulnerabilities in PluXml CMS and other web applications and will respond promptly to new findings.

5. References

https://github.com/lukehebe/Vulnerability-Disclosures/blob/main/CVE-2025-57567.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-57567
Scroll Up