CVE-2025-0702
Published: 24 January 2025
Summary
CVE-2025-0702 is a medium-severity Improper Access Control (CWE-284) vulnerability in Joeybling Bootplus. Its CVSS base score is 6.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 34.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-3 (Malicious Code Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 directly prevents unrestricted file uploads by requiring validation of the portraitFile argument for type, size, and content in SysFileController.java.
SI-9 mitigates the vulnerability by enforcing restrictions on dangerous file types and inputs manipulated via the portraitFile parameter.
SI-3 protects against exploitation of unrestricted uploads by scanning files for malicious code before processing or execution.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unrestricted file upload (CWE-434) in public-facing web app directly enables remote code deployment via web shell after exploitation of the app.
NVD Description
A vulnerability classified as critical was found in JoeyBling bootplus up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d. This vulnerability affects unknown code of the file src/main/java/io/github/controller/SysFileController.java. The manipulation of the argument portraitFile leads to unrestricted upload. The attack can be initiated remotely. The exploit…
more
has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.
Deeper analysisAI
CVE-2025-0702 is a vulnerability classified as critical in JoeyBling bootplus up to commit 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d. It affects unknown code in the file src/main/java/io/github/controller/SysFileController.java, where manipulation of the portraitFile argument enables unrestricted upload of files with dangerous types, associated with CWEs 284 and 434.
The vulnerability is remotely exploitable over the network with low attack complexity, requiring low privileges but no user interaction, and maintaining unchanged scope. An attacker with low privileges can achieve low impacts on confidentiality, integrity, and availability, as reflected in its CVSS 3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
Advisories reference GitHub issues at https://github.com/JoeyBling/bootplus/issues/24 and https://github.com/JoeyBling/bootplus/issues/24#issue-2786919432, along with VulDB entries at https://vuldb.com/?ctiid.293230, https://vuldb.com/?id.293230, and https://vuldb.com/?submit.480841. Due to the product's continuous delivery with rolling releases, no specific details on affected or updated versions are available. The exploit has been publicly disclosed and may be used.
Details
- CWE(s)