Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 11 May 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bitrix
Bitrix bitrix24 |
|
| Vendors & Products |
Bitrix
Bitrix bitrix24 |
Fri, 08 May 2026 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Remote Code Execution via Translate Module Upload in Bitrix24 |
Fri, 08 May 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Bitrix24 Remote Code Execution via Translate Module Upload | |
| Weaknesses | CWE-285 CWE-94 |
Fri, 08 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-434 | |
| Metrics |
cvssV3_1
|
Fri, 08 May 2026 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Bitrix24 Remote Code Execution via Translate Module Upload | |
| Weaknesses | CWE-285 CWE-94 |
Fri, 08 May 2026 07:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 08 May 2026 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Bitrix24 through 25.100.300 allows Remote Code Execution because an actor with SOURCE/WRITE permissions for the Translate Module can upload and execute code by sending a PHP file and a .htaccess file. NOTE: this is disputed by the Supplier because this is intended behavior for the high-privileged users who can upload new translated pages to the website. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-08T17:50:46.526Z
Reserved: 2025-12-12T00:00:00.000Z
Link: CVE-2025-67886
Updated: 2026-05-08T05:52:25.556Z
Status : Awaiting Analysis
Published: 2026-05-08T07:16:28.180
Modified: 2026-05-08T18:16:32.947
Link: CVE-2025-67886
No data.
OpenCVE Enrichment
Updated: 2026-05-11T16:11:33Z