CVE-2025-25784
Published: 26 February 2025
Summary
CVE-2025-25784 is a critical-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Jizhicms Jizhicms. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 38.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-2 mandates timely identification, reporting, and correction of flaws, directly addressing the specific arbitrary file upload vulnerability in TemplateController.php through patching.
SI-10 requires validation of information inputs, preventing exploitation by ensuring uploaded Zip files are checked for malicious content before processing.
SI-9 restricts the types and amounts of allowable inputs, blocking arbitrary uploads of crafted Zip files that enable code execution.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated remote arbitrary file upload (Zip) in public-facing PHP web app directly enables T1190 exploitation and T1505.003 web shell deployment for arbitrary code execution.
NVD Description
An arbitrary file upload vulnerability in the component \c\TemplateController.php of Jizhicms v2.5.4 allows attackers to execute arbitrary code via uploading a crafted Zip file.
Deeper analysisAI
CVE-2025-25784 is an arbitrary file upload vulnerability affecting the TemplateController.php component in Jizhicms version 2.5.4. Published on 2025-02-26, the flaw enables attackers to execute arbitrary code by uploading a specially crafted Zip file, as classified under CWE-434 (Unrestricted Upload of File with Dangerous Type). The vulnerability carries a CVSS v3.1 base score of 9.8, reflecting its critical severity.
Remote attackers require no privileges, authentication, or user interaction to exploit this issue over the network with low complexity. Successful exploitation allows full compromise of the affected system, providing high-impact access to confidentiality, integrity, and availability through arbitrary code execution.
Mitigation details and additional information are available in the referenced resources, including the Jizhicms websites at http://jizhicms.com and https://www.jizhicms.cn/, as well as documentation in the GitHub repository at https://github.com/Ka7arotto/JizhiCms/blob/main/jizhicms.md.
Details
- CWE(s)