CVE-2025-25761
Published: 27 February 2025
Summary
CVE-2025-25761 is a high-severity External Control of File Name or Path (CWE-73) vulnerability in Hkcms Hkcms. Its CVSS base score is 7.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Web Shell (T1505.003); ranked at the 42.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely identification, reporting, and correction of the arbitrary file write flaw in HkCms Appcenter.php to prevent exploitation.
Enforces information input validation at entry points like Appcenter.php to block external control of file names or paths enabling arbitrary writes.
Restricts high-privilege access required to reach and exploit the arbitrary file write vulnerability in Appcenter.php.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Arbitrary file write in a web application component directly enables deployment of a web shell for RCE after admin authentication.
NVD Description
HkCms v2.3.2.240702 was discovered to contain an arbitrary file write vulnerability in the component Appcenter.php.
Deeper analysisAI
CVE-2025-25761 is an arbitrary file write vulnerability affecting HkCms version 2.3.2.240702, specifically in the Appcenter.php component. Published on 2025-02-27, it has a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-73 (External Control of File Name or Path). This flaw allows attackers to write arbitrary files on the server, potentially leading to severe impacts on confidentiality, integrity, and availability.
The vulnerability can be exploited remotely over the network with low attack complexity and no user interaction required, but it necessitates high privileges (PR:H), such as those held by authenticated administrators. Successful exploitation enables an attacker to overwrite critical files, which could result in remote code execution, privilege escalation, or complete system compromise, given the high impact ratings across all three vectors.
Further details on the vulnerability, including potential mitigation steps, are documented in advisories referenced at https://github.com/147536951/Qianyi-learn/blob/main/Hkcms.pdf. Security practitioners should review these resources and apply any available patches or workarounds to affected HkCms installations.
Details
- CWE(s)