CVE-2025-8323
Published: 30 July 2025
Summary
CVE-2025-8323 is a high-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Org (inferred from references). Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 34.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates unrestricted arbitrary file uploads by enforcing validation of file types and content at input points, preventing web shell backdoors.
Requires identification, testing, and installation of patches to remediate the specific arbitrary file upload flaw enabling RCE.
Deploys malicious code protection at system entry points to scan and block web shell uploads or execution attempts.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct arbitrary file upload of web shells on public-facing app enables T1190 exploitation and T1505.003 web shell deployment for code execution.
NVD Description
The e-School from Ventem has a Arbitrary File Upload vulnerability, allowing unauthenticated remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.
Deeper analysisAI
CVE-2025-8323 is an Arbitrary File Upload vulnerability in the e-School software from Ventem. Published on 2025-07-30, it carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-434 (Unrestricted Upload of File with Dangerous Type). The issue enables unauthenticated remote attackers to upload web shell backdoors and execute them, resulting in arbitrary code execution on the affected server.
An unauthenticated remote attacker can exploit this vulnerability over the network with low attack complexity and no user interaction. Successful exploitation allows the attacker to upload malicious files, such as web shells, and execute arbitrary code on the server, potentially granting full control over the system and leading to high impacts on confidentiality, integrity, and availability.
TWCERT advisories provide additional details on this vulnerability, including at https://www.twcert.org.tw/en/cp-139-10307-25cdf-2.html and https://www.twcert.org.tw/tw/cp-132-10306-ccea7-1.html. Security practitioners should consult these for recommended mitigations and patches.
Details
- CWE(s)