Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 13 May 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 May 2026 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Remote Code Execution via Translate Module File Upload in 1C‑Bitrix 25.100.500 |
Tue, 12 May 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Remote Code Execution via Upload of PHP and .htaccess in 1C‑Bitrix Translate Module | |
| Weaknesses | CWE-434 |
Mon, 11 May 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-94 | |
| Metrics |
cvssV3_1
|
Fri, 08 May 2026 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Remote Code Execution via Upload of PHP and .htaccess in 1C‑Bitrix Translate Module | |
| Weaknesses | CWE-434 |
Fri, 08 May 2026 07:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 08 May 2026 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | 1C-Bitrix through 25.100.500 allows Remote Code Execution because an actor with SOURCE/WRITE permissions for the Translate Module can upload and execute code by sending a PHP file and a .htaccess file. NOTE: this is disputed by the Supplier because this is intended behavior for the high-privileged users who can upload new translated pages to the website. | |
| References |
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-11T19:07:24.400Z
Reserved: 2025-12-12T00:00:00.000Z
Link: CVE-2025-67887
Updated: 2026-05-08T05:52:28.158Z
Status : Awaiting Analysis
Published: 2026-05-08T07:16:28.350
Modified: 2026-05-11T20:25:40.910
Link: CVE-2025-67887
No data.
OpenCVE Enrichment
Updated: 2026-05-12T01:30:04Z