Cyber Posture

CVE-2025-2216

MediumPublic PoC

Published: 12 March 2025

Published
12 March 2025
Modified
25 March 2025
KEV Added
Patch
CVSS Score 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0006 17.2th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-2216 is a medium-severity Improper Access Control (CWE-284) vulnerability in Zzskzy Warehouse Refinement Management System. Its CVSS base score is 6.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 17.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 directly prevents unrestricted file uploads by validating the type, content, and integrity of uploaded files via the manipulated 'file' argument.

prevent

AC-3 enforces approved access controls on the UploadCrash function to block low-privilege attackers from manipulating the file upload endpoint.

prevent

SI-2 requires timely identification and remediation of the unrestricted file upload flaw in SaveCrash.ashx, including patching or equivalent mitigations.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1608.002 Upload Tool Resource Development
Adversaries may upload tools to third-party or adversary controlled infrastructure to make it accessible during targeting.
Why these techniques?

Unrestricted file upload vulnerability in public-facing web endpoint (/crash/log/SaveCrash.ashx) enables exploitation of public-facing applications (T1190) and facilitates uploading tools for staging capabilities (T1608.002), as explicitly mapped in advisories and leading to RCE.

NVD Description

A vulnerability, which was classified as critical, has been found in zzskzy Warehouse Refinement Management System 1.3. Affected by this issue is the function UploadCrash of the file /crash/log/SaveCrash.ashx. The manipulation of the argument file leads to unrestricted upload. The…

more

attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Deeper analysisAI

CVE-2025-2216, published on 2025-03-12, is a critical vulnerability in the zzskzy Warehouse Refinement Management System version 1.3. It affects the UploadCrash function within the file /crash/log/SaveCrash.ashx, where manipulation of the "file" argument enables unrestricted file upload. The issue is associated with CWE-284 (Improper Access Control) and CWE-434 (Unrestricted Upload of File with Dangerous Type), and it carries a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).

A remote attacker with low privileges can exploit this vulnerability with low complexity and no user interaction required. By manipulating the file upload argument, the attacker achieves limited impacts on confidentiality, integrity, and availability, potentially allowing upload of malicious files.

Advisories from VulDB indicate that the vendor was contacted early regarding the disclosure but provided no response or patch. The exploit has been publicly disclosed, including in a GitHub repository, and may be actively used by attackers.

Details

CWE(s)

Affected Products

zzskzy
warehouse refinement management system
1.3

CVEs Like This One

CVE-2025-2115Same product: Zzskzy Warehouse Refinement Management System
CVE-2025-2217Same product: Zzskzy Warehouse Refinement Management System
CVE-2025-7877Shared CWE-284, CWE-434
CVE-2025-7879Shared CWE-284, CWE-434
CVE-2025-2035Shared CWE-284, CWE-434
CVE-2025-7181Shared CWE-284, CWE-434
CVE-2025-7878Shared CWE-284, CWE-434
CVE-2025-9296Shared CWE-284, CWE-434
CVE-2025-0335Shared CWE-284, CWE-434
CVE-2025-7538Shared CWE-284, CWE-434

References