Cyber Posture

CVE-2025-0702

Medium

Published: 24 January 2025

Published
24 January 2025
Modified
10 October 2025
KEV Added
Patch
CVSS Score 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0015 34.8th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-0702 is a medium-severity Improper Access Control (CWE-284) vulnerability in Joeybling Bootplus. Its CVSS base score is 6.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 34.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-3 (Malicious Code Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 directly prevents unrestricted file uploads by requiring validation of the portraitFile argument for type, size, and content in SysFileController.java.

prevent

SI-9 mitigates the vulnerability by enforcing restrictions on dangerous file types and inputs manipulated via the portraitFile parameter.

preventdetect

SI-3 protects against exploitation of unrestricted uploads by scanning files for malicious code before processing or execution.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

Unrestricted file upload (CWE-434) in public-facing web app directly enables remote code deployment via web shell after exploitation of the app.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A vulnerability classified as critical was found in JoeyBling bootplus up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d. This vulnerability affects unknown code of the file src/main/java/io/github/controller/SysFileController.java. The manipulation of the argument portraitFile leads to unrestricted upload. The attack can be initiated remotely. The exploit…

more

has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.

Deeper analysisAI

CVE-2025-0702 is a vulnerability classified as critical in JoeyBling bootplus up to commit 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d. It affects unknown code in the file src/main/java/io/github/controller/SysFileController.java, where manipulation of the portraitFile argument enables unrestricted upload of files with dangerous types, associated with CWEs 284 and 434.

The vulnerability is remotely exploitable over the network with low attack complexity, requiring low privileges but no user interaction, and maintaining unchanged scope. An attacker with low privileges can achieve low impacts on confidentiality, integrity, and availability, as reflected in its CVSS 3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).

Advisories reference GitHub issues at https://github.com/JoeyBling/bootplus/issues/24 and https://github.com/JoeyBling/bootplus/issues/24#issue-2786919432, along with VulDB entries at https://vuldb.com/?ctiid.293230, https://vuldb.com/?id.293230, and https://vuldb.com/?submit.480841. Due to the product's continuous delivery with rolling releases, no specific details on affected or updated versions are available. The exploit has been publicly disclosed and may be used.

Details

CWE(s)

Affected Products

joeybling
bootplus
≤ 2020-08-24

CVEs Like This One

CVE-2025-0698Same product: Joeybling Bootplus
CVE-2025-0701Same product: Joeybling Bootplus
CVE-2025-0699Same product: Joeybling Bootplus
CVE-2025-0700Same product: Joeybling Bootplus
CVE-2026-7733Shared CWE-284, CWE-434
CVE-2026-2979Shared CWE-284, CWE-434
CVE-2025-7470Shared CWE-284, CWE-434
CVE-2026-3800Shared CWE-284, CWE-434
CVE-2026-4220Shared CWE-284, CWE-434
CVE-2026-4536Shared CWE-284, CWE-434

References