SugarCRM CE unserialize PHP Code Execution Exploit

The vulnerability is caused by scripts using "unserialize()" with user controlled input. This can be exploited to execute arbitrary PHP code via the "__destruct()" method of the "SugarTheme" class or passing an ad-hoc serialized object through the $_REQUEST['current_query_by_page'] input variable.
Exploit Type - Old
Exploits/Remote
Exploit Platform
Exploit Type
Product Name