Cyber Posture

CVE-2025-25790

CriticalPublic PoC

Published: 26 February 2025

Published
26 February 2025
Modified
09 April 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0021 43.8th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-25790 is a critical-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Foxcms Foxcms. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 43.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the arbitrary file upload flaw in FoxCMS LocalTemplate.php to prevent attackers from uploading crafted Zip files for code execution.

prevent

Validates uploaded files at the application layer to ensure only safe types and contents are processed, blocking unrestricted uploads of dangerous Zip files.

preventdetect

Deploys malicious code protection mechanisms to scan and eradicate crafted malicious Zip files during upload or prior to execution.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1100 Web Shell Persistence
A Web shell is a Web script that is placed on an openly accessible Web server to allow an adversary to use the Web server as a gateway into a network.
Why these techniques?

Arbitrary file upload leading to unauthenticated RCE on public-facing FoxCMS web app directly enables T1190 for initial access and T1100 for web shell deployment via crafted ZIP.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

An arbitrary file upload vulnerability in the component \controller\LocalTemplate.php of FoxCMS v1.2.5 allows attackers to execute arbitrary code via uploading a crafted Zip file.

Deeper analysisAI

CVE-2025-25790 is an arbitrary file upload vulnerability in the \controller\LocalTemplate.php component of FoxCMS version 1.2.5. Published on 2025-02-26, it allows attackers to execute arbitrary code by uploading a crafted Zip file and is associated with CWE-434 (Unrestricted Upload of File with Dangerous Type). The issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical.

Any unauthenticated attacker with network access can exploit this vulnerability due to its low attack complexity and lack of required privileges or user interaction. Successful exploitation enables remote arbitrary code execution, resulting in high impacts to confidentiality, integrity, and availability on the targeted FoxCMS instance.

Advisories and further details, potentially including mitigation guidance, are referenced at http://foxcms.com, https://www.foxcms.cn/, and https://github.com/Ka7arotto/FoxCMS/blob/main/FoxCMS-upload-rce.md.

Details

CWE(s)

Affected Products

foxcms
foxcms
1.2.5

CVEs Like This One

CVE-2025-25789Same product: Foxcms Foxcms
CVE-2025-50692Same product: Foxcms Foxcms
CVE-2025-55409Same product: Foxcms Foxcms
CVE-2025-29306Same product: Foxcms Foxcms
CVE-2025-55420Same product: Foxcms Foxcms
CVE-2025-49387Shared CWE-434
CVE-2025-52353Shared CWE-434
CVE-2025-22504Shared CWE-434
CVE-2026-33717Shared CWE-434
CVE-2025-14894Shared CWE-434

References