CVE-2025-47292: Cap Collectif vulnerable to insecure deserialization leading to remote code execution

9.5 CVSS

Description

Cap Collectif is an online decision making platform that integrates several tools. Before commit 812f2a7d271b76deab1175bdaf2be0b8102dd198, the `DebateAlternateArgumentsResolver` deserializes a `Cursor`, allowing any classes and which can be controlled by unauthenticated user. Exploitation of this vulnerability can lead to Remote Code Execution. The vulnerability is fixed in commit 812f2a7d271b76deab1175bdaf2be0b8102dd198.

Classification

CVE ID: CVE-2025-47292

CVSS Base Severity: CRITICAL

CVSS Base Score: 9.5

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem Types

CWE-502: Deserialization of Untrusted Data

Affected Products

Vendor: cap-collectif

Product: cap-collectif

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.52% (probability of being exploited)

EPSS Percentile: 65.84% (scored less or equal to compared to others)

EPSS Date: 2025-06-06 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-47292
https://github.com/cap-collectif/cap-collectif/security/advisories/GHSA-hf7r-rjh4-5fc8
https://github.com/cap-collectif/cap-collectif/commit/812f2a7d271b76deab1175bdaf2be0b8102dd198

Timeline