Cyber Posture

CVE-2024-25182

CriticalPublic PoC

Published: 29 December 2025

Published
29 December 2025
Modified
02 January 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0021 42.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-25182 is a critical-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Vvveb Vvvebjs. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 42.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the unrestricted file upload vulnerability in VvvebJs 1.7.2 save.php by identifying, reporting, and correcting the specific flaw.

prevent

Validates file inputs to the save.php endpoint to ensure only safe types and content are accepted, preventing CWE-434 unrestricted uploads of dangerous files.

preventdetect

Detects and eradicates malicious code in uploaded files via protection mechanisms at system entry points, mitigating high-impact exploitation of the vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

Unauthenticated arbitrary file upload vulnerability in a public-facing web application (VvvebJs save.php) directly enables T1190 (Exploit Public-Facing Application) and facilitates uploading web shells for persistence/execution (T1100).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

givanz VvvebJs 1.7.2 suffers from a File Upload vulnerability via save.php.

Deeper analysisAI

CVE-2024-25182 is a file upload vulnerability in givanz VvvebJs version 1.7.2, exploitable via the save.php component. Published on 2025-12-29, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), classifying it as critical severity and mapping to CWE-434 (Unrestricted Upload of File with Dangerous Type).

Unauthenticated remote attackers require only network access and can exploit the issue with low attack complexity and no user interaction. Exploitation enables high-impact effects on confidentiality, integrity, and availability, allowing attackers to upload arbitrary files through the vulnerable endpoint.

Mitigation details are provided in the referenced advisory at https://gist.github.com/joaoviictorti/ff6220d8ed6df77a0420f4413a1d9b8d.

Details

CWE(s)

Affected Products

vvveb
vvvebjs
1.7.2

CVEs Like This One

CVE-2024-27480Same product: Vvveb Vvvebjs
CVE-2024-25181Same product: Vvveb Vvvebjs
CVE-2025-8323Shared CWE-434
CVE-2026-35047Shared CWE-434
CVE-2025-1128Shared CWE-434
CVE-2025-67910Shared CWE-434
CVE-2026-22799Shared CWE-434
CVE-2025-15226Shared CWE-434
CVE-2025-6440Shared CWE-434
CVE-2026-2097Shared CWE-434

References