CVE-2025-25790
Published: 26 February 2025
Summary
CVE-2025-25790 is a critical-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Foxcms Foxcms. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 43.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the arbitrary file upload flaw in FoxCMS LocalTemplate.php to prevent attackers from uploading crafted Zip files for code execution.
Validates uploaded files at the application layer to ensure only safe types and contents are processed, blocking unrestricted uploads of dangerous Zip files.
Deploys malicious code protection mechanisms to scan and eradicate crafted malicious Zip files during upload or prior to execution.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Arbitrary file upload leading to unauthenticated RCE on public-facing FoxCMS web app directly enables T1190 for initial access and T1100 for web shell deployment via crafted ZIP.
NVD Description
An arbitrary file upload vulnerability in the component \controller\LocalTemplate.php of FoxCMS v1.2.5 allows attackers to execute arbitrary code via uploading a crafted Zip file.
Deeper analysisAI
CVE-2025-25790 is an arbitrary file upload vulnerability in the \controller\LocalTemplate.php component of FoxCMS version 1.2.5. Published on 2025-02-26, it allows attackers to execute arbitrary code by uploading a crafted Zip file and is associated with CWE-434 (Unrestricted Upload of File with Dangerous Type). The issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical.
Any unauthenticated attacker with network access can exploit this vulnerability due to its low attack complexity and lack of required privileges or user interaction. Successful exploitation enables remote arbitrary code execution, resulting in high impacts to confidentiality, integrity, and availability on the targeted FoxCMS instance.
Advisories and further details, potentially including mitigation guidance, are referenced at http://foxcms.com, https://www.foxcms.cn/, and https://github.com/Ka7arotto/FoxCMS/blob/main/FoxCMS-upload-rce.md.
Details
- CWE(s)