ShopXO, Unrestricted File Upload, CVE-2025-5108 (Critical)

Listen to this Post

How CVE-2025-5108 Works

The vulnerability exists in ShopXO 6.5.0’s payment module (app/admin/controller/Payment.php). The ZIP file handler component fails to properly validate user-supplied input in the ‘params’ argument during file upload operations. This allows attackers to bypass file type restrictions and upload malicious files (e.g., PHP webshells) to the server. The remote attack vector enables unauthenticated users to execute arbitrary code on the vulnerable system through crafted HTTP requests containing malicious ZIP archives. The lack of proper file extension checks and content validation leads to server compromise.

DailyCVE Form

Platform: ShopXO
Version: 6.5.0
Vulnerability: Unrestricted File Upload
Severity: Critical
Date: 07/01/2025

Prediction: Patch by 08/15/2025

What Undercode Say

curl -X POST -F "[email protected]" http://target/payment/upload
// Vulnerable code snippet in Payment.php
public function upload() {
$params = $_POST['params']; // Unvalidated input
$zip = new ZipArchive;
$zip->extractTo($targetPath); // No sanitization
}

How Exploit

1. Craft malicious ZIP with PHP webshell

2. Send POST request to /payment/upload

3. Access uploaded shell via webroot

4. Execute system commands

Protection from this CVE

1. Update to patched version

2. Implement file type verification

3. Restrict upload directories

4. Disable PHP execution in uploads

Impact

1. Remote code execution

2. Server compromise

3. Data theft

4. System takeover

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

πŸ”JOIN OUR CYBER WORLD [ CVE News β€’ HackMonitor β€’ UndercodeNews ]

πŸ’¬ Whatsapp | πŸ’¬ Telegram

πŸ“’ Follow DailyCVE & Stay Tuned:

𝕏 formerly Twitter 🐦 | @ Threads | πŸ”— Linkedin Featured Image

Scroll to Top