CVE-2025-1818
Published: 02 March 2025
Summary
CVE-2025-1818 is a medium-severity Improper Access Control (CWE-284) vulnerability in Zframeworks Zz. Its CVSS base score is 6.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 23.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates unrestricted file upload by validating the type, size, and content of the manipulated 'file' argument to block dangerous uploads.
Restricts allowed information inputs to the upload endpoint, preventing unrestricted upload of dangerous file types as per CWE-434.
Enforces approved access control policies on the ZfileAction.upload processing to address improper access control (CWE-284) and block unauthorized file manipulations.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unrestricted file upload in public-facing web component directly enables initial access via T1190, arbitrary file ingress via T1105, and web shell deployment via T1505.003.
NVD Description
A vulnerability, which was classified as critical, has been found in zj1983 zz up to 2024-8. This issue affects some unknown processing of the file src/main/java/com/futvan/z/system/zfile/ZfileAction.upload. The manipulation of the argument file leads to unrestricted upload. The attack may be…
more
initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Deeper analysisAI
CVE-2025-1818 is a critical vulnerability in zj1983 zz versions up to 2024-8, affecting the processing of file uploads in the component src/main/java/com/futvan/z/system/zfile/ZfileAction.upload. The flaw enables unrestricted file upload through manipulation of the "file" argument and can be triggered remotely.
A remote attacker with low privileges (PR:L) can exploit this vulnerability over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). Exploitation leads to low impacts on confidentiality, integrity, and availability (C:L/I:L/A:L) within unchanged scope (S:U), as reflected in its CVSS 3.1 base score of 6.3. The issue maps to CWE-284 (Improper Access Control) and CWE-434 (Unrestricted Upload of File with Dangerous Type).
Advisories detailing the vulnerability are published on VulDB, including entry IDs at https://vuldb.com/?ctiid.298091 and https://vuldb.com/?id.298091, with additional disclosure at https://www.yuque.com/u123456789-6sobi/cdgcbq/bg2g3eit41o4cpd4. The exploit has been publicly disclosed and may be used, but the vendor was contacted early and provided no response; no patches or specific mitigations are referenced.
The vulnerability was published on 2025-03-02, and while the exploit is available, no real-world exploitation in the wild is noted in available details.
Details
- CWE(s)