CVE-2025-60947
Published: 23 March 2026
Summary
CVE-2025-60947 is a high-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Csprousers Csweb. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 45.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates unrestricted file uploads by enforcing validation of file types, extensions, and content at upload points to prevent dangerous files from being accepted.
Requires timely patching of the specific arbitrary file upload flaw as fixed in Census CSWeb 8.1.0 to eliminate the vulnerability.
Deploys malicious code protection at system entry points like file uploads to scan and block executable or dangerous files leading to RCE.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Arbitrary file upload in public-facing web application enables exploitation for initial access (T1190) and privilege escalation from low-priv auth to RCE (T1068).
NVD Description
Census CSWeb 8.0.1 allows arbitrary file upload. A remote, authenticated attacker could upload a malicious file, possibly leading to remote code execution. Fixed in 8.1.0 alpha.
Deeper analysisAI
CVE-2025-60947 is an arbitrary file upload vulnerability affecting Census CSWeb version 8.0.1. Published on 2026-03-23, it is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). The flaw enables a remote, authenticated attacker to upload a malicious file, potentially resulting in remote code execution.
A remote attacker with low-privilege authenticated access can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, allowing the attacker to execute arbitrary code on the server by uploading and triggering a malicious file.
Mitigation is available in Census CSWeb 8.1.0 alpha, as indicated by the patching commit at https://github.com/csprousers/csweb/commit/eba0b59a243390a1a4f9524cce6dbc0314bf0d91. Additional resources include a CISA advisory at https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2026/va-26-082-01.json, the official CVE record at https://www.cve.org/CVERecord?id=CVE-2025-60947, and an exploits repository at https://github.com/hx381/cspro-exploits. Security practitioners should upgrade to the fixed version and review access controls for file upload functionalities.
Details
- CWE(s)