CVE-2025-60786
Published: 15 December 2025
Summary
CVE-2025-60786 is a high-severity Path Traversal (CWE-22) vulnerability in Kagilum Icescrum. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 36.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents Zip Slip exploitation by requiring validation of file paths and contents in uploaded zip archives to block path traversal and arbitrary file writes.
Addresses the vulnerability at its core by mandating identification, prioritization, and timely remediation of the Zip Slip flaw through vendor patches or updates.
Mitigates impact by enforcing access control policies that restrict file write operations to authorized paths only, limiting damage from path traversal during project import.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Zip Slip path traversal in web app project import enables low-priv remote attackers to overwrite files for arbitrary code execution, directly facilitating T1190 (exploit public-facing app) and T1068 (exploitation for privilege escalation).
NVD Description
A Zip Slip vulnerability in the import a Project component of iceScrum v7.54 Pro On-prem allows attackers to execute arbitrary code via uploading a crafted Zip file.
Deeper analysisAI
CVE-2025-60786, published on 2025-12-15, is a Zip Slip vulnerability (CWE-22) in the "import a Project" component of iceScrum v7.54 Pro On-prem. This flaw enables attackers to execute arbitrary code by uploading a crafted Zip file during project import operations. The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), reflecting its high severity due to network accessibility, low attack complexity, and significant impacts on confidentiality, integrity, and availability.
Exploitation requires low privileges (PR:L), allowing authenticated users—such as registered project collaborators or low-level admins—to target the component remotely over the network without user interaction. A successful attack involves uploading a maliciously crafted Zip archive, which exploits path traversal to overwrite critical files and trigger arbitrary code execution on the server, potentially leading to full system compromise.
For mitigation guidance, security practitioners should consult the vendor's download page at https://www.icescrum.com/download/ and the detailed analysis at https://zdaylabs.com/CVE-2025-60786.html, which may include patches or workarounds for iceScrum v7.54 Pro On-prem.
Details
- CWE(s)