Cyber Posture

CVE-2025-0722

MediumPublic PoC

Published: 27 January 2025

Published
27 January 2025
Modified
25 February 2025
KEV Added
Patch
CVSS Score 4.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0006 17.7th percentile
Risk Priority 9 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-0722 is a medium-severity Improper Access Control (CWE-284) vulnerability in Needyamin Image Gallery Management System. Its CVSS base score is 4.7 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 17.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Validates the 'image' argument in /admin/gallery.php to ensure only safe, legitimate files are accepted, directly preventing unrestricted upload of dangerous types.

prevent

Requires timely identification, reporting, and remediation of the specific flaw in needyamin image_gallery 1.0 Cover Image Handler to eliminate the vulnerability.

prevent

Enforces logical access controls on the vulnerable endpoint to restrict high-privilege manipulation of the image argument per CWE-284 improper access control.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1105 Ingress Tool Transfer Command And Control
Adversaries may transfer tools or other files from an external system into a compromised environment.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

Unrestricted file upload vulnerability in the web application's admin panel (/admin/gallery.php) enables exploitation of a public-facing application (T1190), ingress tool transfer by uploading arbitrary files including webshells or tools (T1105), and deployment of web shells for persistence and remote code execution (T1505.003).

NVD Description

A vulnerability classified as critical was found in needyamin image_gallery 1.0. This vulnerability affects unknown code of the file /admin/gallery.php of the component Cover Image Handler. The manipulation of the argument image leads to unrestricted upload. The attack can be…

more

initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Deeper analysisAI

CVE-2025-0722 is a vulnerability in needyamin image_gallery version 1.0 that enables unrestricted file upload. It affects unknown code within the /admin/gallery.php file of the Cover Image Handler component, where manipulation of the "image" argument triggers the issue. Classified as critical with a CVSS v3.1 base score of 4.7 (AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L), it maps to CWEs 284 (Improper Access Control) and 434 (Unrestricted Upload of File with Dangerous Type). The vulnerability was published on 2025-01-27.

Attackers with high privileges (PR:H) can exploit this remotely over the network with low complexity and no user interaction required. Successful exploitation grants low-level impacts on confidentiality, integrity, and availability, potentially allowing upload of malicious files through the Cover Image Handler.

Advisories from VulDB and WebSecurityInsights document the issue, noting that an exploit has been publicly disclosed and may be in use. The vendor was contacted early but provided no response, and no patches or mitigations are mentioned in available references.

The public disclosure of the exploit increases the risk of real-world attacks on exposed instances of needyamin image_gallery 1.0.

Details

CWE(s)

Affected Products

needyamin
image gallery management system
1.0

CVEs Like This One

CVE-2025-1355Same vendor: Needyamin
CVE-2025-1166Shared CWE-284, CWE-434
CVE-2026-4221Shared CWE-284, CWE-434
CVE-2025-1555Shared CWE-284, CWE-434
CVE-2025-1818Shared CWE-284, CWE-434
CVE-2026-2977Shared CWE-284, CWE-434
CVE-2025-2350Shared CWE-284, CWE-434
CVE-2026-1424Shared CWE-284, CWE-434
CVE-2025-2115Shared CWE-284, CWE-434
CVE-2026-3025Shared CWE-284, CWE-434

References