Cyber Posture

CVE-2025-25761

High

Published: 27 February 2025

Published
27 February 2025
Modified
09 April 2025
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0020 42.3th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-25761 is a high-severity External Control of File Name or Path (CWE-73) vulnerability in Hkcms Hkcms. Its CVSS base score is 7.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Web Shell (T1505.003); ranked at the 42.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Web Shell (T1505.003). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely identification, reporting, and correction of the arbitrary file write flaw in HkCms Appcenter.php to prevent exploitation.

prevent

Enforces information input validation at entry points like Appcenter.php to block external control of file names or paths enabling arbitrary writes.

prevent

Restricts high-privilege access required to reach and exploit the arbitrary file write vulnerability in Appcenter.php.

MITRE ATT&CK Enterprise TechniquesAI

T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

Arbitrary file write in a web application component directly enables deployment of a web shell for RCE after admin authentication.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

HkCms v2.3.2.240702 was discovered to contain an arbitrary file write vulnerability in the component Appcenter.php.

Deeper analysisAI

CVE-2025-25761 is an arbitrary file write vulnerability affecting HkCms version 2.3.2.240702, specifically in the Appcenter.php component. Published on 2025-02-27, it has a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-73 (External Control of File Name or Path). This flaw allows attackers to write arbitrary files on the server, potentially leading to severe impacts on confidentiality, integrity, and availability.

The vulnerability can be exploited remotely over the network with low attack complexity and no user interaction required, but it necessitates high privileges (PR:H), such as those held by authenticated administrators. Successful exploitation enables an attacker to overwrite critical files, which could result in remote code execution, privilege escalation, or complete system compromise, given the high impact ratings across all three vectors.

Further details on the vulnerability, including potential mitigation steps, are documented in advisories referenced at https://github.com/147536951/Qianyi-learn/blob/main/Hkcms.pdf. Security practitioners should review these resources and apply any available patches or workarounds to affected HkCms installations.

Details

CWE(s)

Affected Products

hkcms
hkcms
2.3.2.240702

CVEs Like This One

CVE-2026-4132Shared CWE-73
CVE-2026-28442Shared CWE-73
CVE-2026-30940Shared CWE-73
CVE-2025-66254Shared CWE-73
CVE-2026-25605Shared CWE-73
CVE-2026-26360Shared CWE-73
CVE-2025-12529Shared CWE-73
CVE-2026-25628Shared CWE-73
CVE-2025-66257Shared CWE-73
CVE-2026-30287Shared CWE-73

References