CVE-2025-63601
Published: 05 November 2025
Summary
CVE-2025-63601 is a critical-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Snipeitapp Snipe-It. Its CVSS base score is 9.9 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 31.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Timely flaw remediation through patching to Snipe-IT 8.3.3 directly eliminates the unrestricted backup file upload vulnerability enabling RCE.
Information input validation at the backup upload entry point prevents acceptance of malicious files containing arbitrary code.
Malicious code protection mechanisms scan and block execution of arbitrary commands from uploaded backup files.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a remote code execution via unrestricted file upload in a web application (Snipe-IT), directly enabling exploitation of a public-facing or remotely accessible application (T1190). With low-privilege authentication required, it facilitates privilege escalation through RCE (T1068).
NVD Description
Snipe-IT before version 8.3.3 contains a remote code execution vulnerability that allows an authenticated attacker to upload a malicious backup file containing arbitrary files and execute system commands.
Deeper analysisAI
CVE-2025-63601, published on 2025-11-05, is a remote code execution vulnerability affecting Snipe-IT versions before 8.3.3. The issue, classified under CWE-434 (Unrestricted Upload of File with Dangerous Type), carries a CVSS v3.1 base score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). It enables an authenticated attacker to upload a malicious backup file containing arbitrary files, resulting in the execution of system commands on the server.
The vulnerability can be exploited by an attacker with low-privilege authenticated access over the network. Exploitation requires low complexity and no user interaction, with a changed scope that amplifies impact to high levels across confidentiality, integrity, and availability. Successful attacks allow arbitrary system command execution, potentially leading to full server compromise.
Official mitigation is provided via upgrade to Snipe-IT version 8.3.3, as detailed in the GitHub release tag. A corresponding fix is included in pull request #17966 on the Snipe-IT repository. Additional advisory details and proof-of-concept information are available from DappSec and FPT Cloud references.
Details
- CWE(s)