CVE-2025-47916

CRITICAL

CVSS v3

10

CRITICAL

EPSS Score

90.7%

exploit probability

CISA KEV

No

known exploited

Exploitation

SSVC status

Description

Invision Community 5.0.0 before 5.0.7 allows remote code execution via crafted template strings to themeeditor.php. The issue lies within the themeeditor controller (file: /applications/core/modules/front/system/themeeditor.php), where a protected method named customCss can be invoked by unauthenticated users. This method passes the value of the content parameter to the Theme::makeProcessFunction() method; hence it is evaluated by the template engine. Accordingly, this can be exploited by unauth

Technical Details

CVSS v3 Vector
3.1
Published
5/16/2025
Last Modified
6/20/2025

Frequently Asked Questions

What is CVE-2025-47916?

Invision Community 5.0.0 before 5.0.7 allows remote code execution via crafted template strings to themeeditor.php. The issue lies within the themeeditor controller (file: /applications/core/modules/front/system/themeeditor.php), where a protected method named customCss can be invoked by unauthenticated users. This method passes the value of the content parameter to the Theme::makeProcessFunction() method; hence it is evaluated by the template engine. Accordingly, this can be exploited by unauth

Is CVE-2025-47916 actively exploited?

Active exploitation of CVE-2025-47916 has not been confirmed. The EPSS score is 90.7%, indicating the estimated probability of exploitation in the next 30 days.

What is the CVSS score for CVE-2025-47916?

CVE-2025-47916 has a CVSS v3 base score of 10 (CRITICAL severity), with vector string 3.1.

Is CVE-2025-47916 affecting your environment?

Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.