Cyber Posture

CVE-2025-60786

HighPublic PoC

Published: 15 December 2025

Published
15 December 2025
Modified
23 December 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0016 36.6th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-60786 is a high-severity Path Traversal (CWE-22) vulnerability in Kagilum Icescrum. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 36.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents Zip Slip exploitation by requiring validation of file paths and contents in uploaded zip archives to block path traversal and arbitrary file writes.

prevent

Addresses the vulnerability at its core by mandating identification, prioritization, and timely remediation of the Zip Slip flaw through vendor patches or updates.

prevent

Mitigates impact by enforcing access control policies that restrict file write operations to authorized paths only, limiting damage from path traversal during project import.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Zip Slip path traversal in web app project import enables low-priv remote attackers to overwrite files for arbitrary code execution, directly facilitating T1190 (exploit public-facing app) and T1068 (exploitation for privilege escalation).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

A Zip Slip vulnerability in the import a Project component of iceScrum v7.54 Pro On-prem allows attackers to execute arbitrary code via uploading a crafted Zip file.

Deeper analysisAI

CVE-2025-60786, published on 2025-12-15, is a Zip Slip vulnerability (CWE-22) in the "import a Project" component of iceScrum v7.54 Pro On-prem. This flaw enables attackers to execute arbitrary code by uploading a crafted Zip file during project import operations. The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), reflecting its high severity due to network accessibility, low attack complexity, and significant impacts on confidentiality, integrity, and availability.

Exploitation requires low privileges (PR:L), allowing authenticated users—such as registered project collaborators or low-level admins—to target the component remotely over the network without user interaction. A successful attack involves uploading a maliciously crafted Zip archive, which exploits path traversal to overwrite critical files and trigger arbitrary code execution on the server, potentially leading to full system compromise.

For mitigation guidance, security practitioners should consult the vendor's download page at https://www.icescrum.com/download/ and the detailed analysis at https://zdaylabs.com/CVE-2025-60786.html, which may include patches or workarounds for iceScrum v7.54 Pro On-prem.

Details

CWE(s)

Affected Products

kagilum
icescrum
≤ 7.54

CVEs Like This One

CVE-2025-60785Same product: Kagilum Icescrum
CVE-2026-1311Shared CWE-22
CVE-2025-22130Shared CWE-22
CVE-2025-27590Shared CWE-22
CVE-2026-21227Shared CWE-22
CVE-2025-12422Shared CWE-22
CVE-2024-38292Shared CWE-22
CVE-2026-32727Shared CWE-22
CVE-2026-40258Shared CWE-22
CVE-2025-41757Shared CWE-22

References