Etavrian
keyboard_arrow_right Created with Sketch.
News
keyboard_arrow_right Created with Sketch.

Imunify360 AV bug flips malware scanner into server backdoor for 56M sites

Reviewed:
Andrii Daniv
2
min read
Nov 17, 2025
Minimalist illustration of server backdoor from malware scanner misconfiguration showing admin dashboard alert

A remote code execution vulnerability in Imunify360 AV is putting hosting servers that protect up to 56 million websites at risk. Cybersecurity firm Patchstack disclosed the issue publicly in November 2025 after notifying the vendor in late October.

The affected Imunify360 AV malware scanner runs on hosting platforms worldwide and is used to protect websites by scanning for malicious code.

Server Security Scanner Vulnerability Affects Up To 56M Sites
Remote code execution in Imunify360 AV could expose hosting servers that protect millions of sites.

Key Details

Imunify360 AV is a malware scanning tool used by multiple web hosting companies to check website-related files such as PHP, JavaScript, and HTML. The newly disclosed vulnerability allows remote code execution on servers running vulnerable versions of the software. Patchstack states that hosting providers rely on Imunify360 AV to protect over 56 million websites.

  • The flaw resides in the AI-Bolit file scanner and the separate database scanning script imunify_dbscan.php.
  • Remote attackers can embed specially crafted, obfuscated PHP that matches Imunify360 AV deobfuscation signatures.
  • The deobfuscator executes extracted functions on attacker-controlled data, enabling arbitrary system commands or arbitrary PHP code.
  • Patchstack reports that the potential impact ranges from individual website compromise to complete server takeover, depending on configuration and privileges.

According to Patchstack, Imunify360 AV typically installs as a service and often runs with root privileges by default. On shared hosting platforms, successful exploitation can lead to privilege escalation and full root access.

Patchstack states that Imunify360 AV has released a patch and recommends updating to at least version 32.7.4.0. If updating is not possible, the advisory suggests removing the scanner or running it only in an isolated container. Administrators are advised to contact CloudLinux or Imunify360 support for exposure assessment and investigation guidance.

Patchstack has shared details on the vulnerability, assigning it a CVSS score of 9.9. No CVE identifier has been assigned yet, and Patchstack notes that Imunify360 has not issued a public statement so far.

Background Context

Patchstack researchers first identified the problem in the AI-Bolit file scanner component, then confirmed that the database scanner imunify_dbscan.php is vulnerable in the same way. In both cases, attacker-supplied payloads are passed into internal routines that then execute the deobfuscated code.

For the file-scanning path, attackers must place a malicious file where Imunify360 AV will eventually scan it. For the database-scanning path, Patchstack states that attackers only need the ability to write data into the database. Common sources of user-supplied database content include comment forms, contact forms, profile fields, and search logs.

Patchstack explains that detection is difficult because payloads are heavily obfuscated. Techniques include hex escapes, packed payloads, base64 combined with gzinflate, and custom delta or ord transformations. The payloads are constructed so that Imunify360 AV performs the deobfuscation itself during scanning.

Patchstack reports that it informed the vendor about the issue in late October 2025. Customers began receiving notifications from Imunify360 shortly afterward. According to Patchstack, the issue has been publicly documented on Imunify360's Zendesk portal since 4 November 2025.

Source Citations

The information in this report is based on Patchstack's published advisory and statements. Patchstack is a cybersecurity company that researches and discloses web-related vulnerabilities.

Patchstack advisory: Remote code execution vulnerability found in Imunify360

Quickly summarize and get insighs with: 
Author
Etavrian AI
Etavrian AI is developed by Andrii Daniv to produce and optimize content for etavrian.com website.
Reviewed
Andrew Daniv, Andrii Daniv
Andrii Daniv
Andrii Daniv is the founder and owner of Etavrian, a performance-driven agency specializing in PPC and SEO services for B2B and e‑commerce businesses.
Quickly summarize and get insighs with: 
Table of contents