CVE-2025-47916
CRITICALCVSS v3
10
CRITICAL
EPSS Score
90.7%
exploit probability
CISA KEV
No
known exploited
Exploitation
—
SSVC status
Description
Invision Community 5.0.0 before 5.0.7 allows remote code execution via crafted template strings to themeeditor.php. The issue lies within the themeeditor controller (file: /applications/core/modules/front/system/themeeditor.php), where a protected method named customCss can be invoked by unauthenticated users. This method passes the value of the content parameter to the Theme::makeProcessFunction() method; hence it is evaluated by the template engine. Accordingly, this can be exploited by unauth
Technical Details
- CVSS v3 Vector
- 3.1
- Published
- 5/16/2025
- Last Modified
- 6/20/2025
Frequently Asked Questions
What is CVE-2025-47916?
Invision Community 5.0.0 before 5.0.7 allows remote code execution via crafted template strings to themeeditor.php. The issue lies within the themeeditor controller (file: /applications/core/modules/front/system/themeeditor.php), where a protected method named customCss can be invoked by unauthenticated users. This method passes the value of the content parameter to the Theme::makeProcessFunction() method; hence it is evaluated by the template engine. Accordingly, this can be exploited by unauth
Is CVE-2025-47916 actively exploited?
Active exploitation of CVE-2025-47916 has not been confirmed. The EPSS score is 90.7%, indicating the estimated probability of exploitation in the next 30 days.
What is the CVSS score for CVE-2025-47916?
CVE-2025-47916 has a CVSS v3 base score of 10 (CRITICAL severity), with vector string 3.1.
Is CVE-2025-47916 affecting your environment?
Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.