PublicCMS, Arbitrary File Upload Vulnerability, CVE-2025-25361 (Critical)

Listen to this Post

How CVE-2025-25361 Works

The vulnerability exists in the `/cms/CmsWebFileAdminController.java` component of PublicCMS v4.0.202406. Attackers can exploit this flaw by uploading malicious SVG or XML files through the web interface. The system fails to properly validate file types and content, allowing arbitrary code execution when these files are processed by the server. This occurs due to insufficient input sanitization in the file upload handler, which trusts user-supplied file extensions and headers without proper verification.

DailyCVE Form

Platform: PublicCMS
Version: 4.0.202406
Vulnerability: Arbitrary File Upload
Severity: Critical
Date: 07/01/2025

Prediction: Patch expected by 08/15/2025

What Undercode Say

curl -X POST -F "[email protected]" http://target/cms/upload
// Example malicious SVG payload

<svg xmlns="http://www.w3.org/2000/svg" onload="alert('XSS')"/>

How Exploit

1. Craft malicious SVG/XML file

2. Bypass file type checks

3. Upload via vulnerable endpoint

4. Trigger server-side processing

Protection from this CVE

1. Update to patched version

2. Implement file content verification

3. Restrict upload permissions

Impact

1. Remote code execution

2. System compromise

3. Data exfiltration

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

πŸ”JOIN OUR CYBER WORLD [ CVE News β€’ HackMonitor β€’ UndercodeNews ]

πŸ’¬ Whatsapp | πŸ’¬ Telegram

πŸ“’ Follow DailyCVE & Stay Tuned:

𝕏 formerly Twitter 🐦 | @ Threads | πŸ”— Linkedin Featured Image

Scroll to Top