CVE-2025-7063
Published: 30 September 2025
Summary
CVE-2025-7063 is a critical-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Widzialni Pad Cms. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 24.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates unrestricted file uploads by requiring validation of file types, extensions, and content to block dangerous uploads leading to RCE.
Restricts classes of allowable input data, such as whitelisting safe file types and extensions, preventing uploads of arbitrary executable files.
Enforces server-side access authorizations for file upload resources, countering client-controlled permission check bypasses by unauthenticated attackers.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unrestricted file upload in public-facing web app (CWE-434) directly enables unauthenticated RCE via malicious file transfer and web shell execution.
NVD Description
Due to client-controlled permission check parameter, PAD CMS's file upload functionality allows an unauthenticated remote attacker to upload files of any type and extension without restriction, which can then be executed leading to Remote Code Execution. This issue affects all…
more
3 templates: www, bip and ww+bip. This product is End-Of-Life and producent will not publish patches for this vulnerability.
Deeper analysisAI
CVE-2025-7063 is a critical vulnerability in the file upload functionality of PAD CMS, stemming from a client-controlled permission check parameter. This flaw enables an unauthenticated remote attacker to upload files of any type and extension without restriction, allowing subsequent execution and leading to remote code execution (RCE). The issue affects all three templates of PAD CMS: www, bip, and ww+bip. It has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-434 (Unrestricted Upload of File with Dangerous Type).
An unauthenticated attacker with network access can exploit this vulnerability by sending a specially crafted file upload request, bypassing all restrictions on file types and permissions. Successful exploitation grants the attacker the ability to execute arbitrary code on the server, potentially compromising the entire system through full control over confidentiality, integrity, and availability.
The product is end-of-life, and the producer will not publish patches for this vulnerability. For mitigation details, refer to the advisory at https://cert.pl/posts/2025/09/CVE-2025-7063.
Details
- CWE(s)