CVE-2023-31585: n/a in n/a
Grocery-CMS-PHP-Restful-API v1.3 is vulnerable to File Upload via /admin/add-category.php.
AI Analysis
Technical Summary
CVE-2023-31585 is a critical security vulnerability identified in Grocery-CMS-PHP-Restful-API version 1.3. The vulnerability is classified under CWE-434, which pertains to unrestricted file upload flaws. Specifically, the issue exists in the /admin/add-category.php endpoint, where an attacker can upload arbitrary files without proper validation or restrictions. This flaw allows an unauthenticated remote attacker to upload malicious files, potentially leading to full system compromise. The CVSS 3.1 base score is 9.8, indicating a critical severity level with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality (C:H), integrity (I:H), and availability (A:H). Exploiting this vulnerability could enable attackers to execute arbitrary code, deploy web shells, manipulate or delete data, and disrupt service availability. Although no known exploits are currently reported in the wild, the ease of exploitation and the critical impact make this a significant threat. The lack of vendor or product information suggests this CMS might be a niche or less widely known system, but the presence of a RESTful API and PHP backend is common in many web applications, increasing the risk if used in production environments without proper safeguards.
Potential Impact
For European organizations, the impact of this vulnerability could be severe, especially for those using Grocery-CMS-PHP-Restful-API or similar PHP-based CMS platforms in their e-commerce or content management infrastructure. Successful exploitation could lead to unauthorized access to sensitive customer data, intellectual property theft, defacement of websites, and disruption of business operations. Given the criticality and the possibility of remote exploitation without authentication, attackers could leverage this vulnerability to establish persistent access, launch further attacks within the network, or use compromised systems as a foothold for ransomware deployment. This poses significant risks to compliance with GDPR and other data protection regulations in Europe, potentially resulting in legal penalties and reputational damage. Additionally, organizations relying on this CMS for online grocery or retail services could face operational downtime, impacting revenue and customer trust.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately audit their use of Grocery-CMS-PHP-Restful-API version 1.3 or any related components. If the vulnerable version is in use, they should seek patches or updates from the vendor or community; if none are available, consider disabling the /admin/add-category.php endpoint or restricting access to it via network controls such as IP whitelisting or VPN. Implement strict file upload validation mechanisms, including checking file types, sizes, and content signatures, and enforce server-side controls to prevent execution of uploaded files. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious upload attempts targeting this endpoint. Regularly monitor logs for unusual activity related to file uploads and conduct penetration testing to verify the effectiveness of mitigations. Additionally, isolate the CMS environment from critical internal networks to limit lateral movement in case of compromise. Finally, raise awareness among development and security teams about secure coding practices to prevent similar vulnerabilities in custom or third-party applications.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2023-31585: n/a in n/a
Description
Grocery-CMS-PHP-Restful-API v1.3 is vulnerable to File Upload via /admin/add-category.php.
AI-Powered Analysis
Technical Analysis
CVE-2023-31585 is a critical security vulnerability identified in Grocery-CMS-PHP-Restful-API version 1.3. The vulnerability is classified under CWE-434, which pertains to unrestricted file upload flaws. Specifically, the issue exists in the /admin/add-category.php endpoint, where an attacker can upload arbitrary files without proper validation or restrictions. This flaw allows an unauthenticated remote attacker to upload malicious files, potentially leading to full system compromise. The CVSS 3.1 base score is 9.8, indicating a critical severity level with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality (C:H), integrity (I:H), and availability (A:H). Exploiting this vulnerability could enable attackers to execute arbitrary code, deploy web shells, manipulate or delete data, and disrupt service availability. Although no known exploits are currently reported in the wild, the ease of exploitation and the critical impact make this a significant threat. The lack of vendor or product information suggests this CMS might be a niche or less widely known system, but the presence of a RESTful API and PHP backend is common in many web applications, increasing the risk if used in production environments without proper safeguards.
Potential Impact
For European organizations, the impact of this vulnerability could be severe, especially for those using Grocery-CMS-PHP-Restful-API or similar PHP-based CMS platforms in their e-commerce or content management infrastructure. Successful exploitation could lead to unauthorized access to sensitive customer data, intellectual property theft, defacement of websites, and disruption of business operations. Given the criticality and the possibility of remote exploitation without authentication, attackers could leverage this vulnerability to establish persistent access, launch further attacks within the network, or use compromised systems as a foothold for ransomware deployment. This poses significant risks to compliance with GDPR and other data protection regulations in Europe, potentially resulting in legal penalties and reputational damage. Additionally, organizations relying on this CMS for online grocery or retail services could face operational downtime, impacting revenue and customer trust.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately audit their use of Grocery-CMS-PHP-Restful-API version 1.3 or any related components. If the vulnerable version is in use, they should seek patches or updates from the vendor or community; if none are available, consider disabling the /admin/add-category.php endpoint or restricting access to it via network controls such as IP whitelisting or VPN. Implement strict file upload validation mechanisms, including checking file types, sizes, and content signatures, and enforce server-side controls to prevent execution of uploaded files. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious upload attempts targeting this endpoint. Regularly monitor logs for unusual activity related to file uploads and conduct penetration testing to verify the effectiveness of mitigations. Additionally, isolate the CMS environment from critical internal networks to limit lateral movement in case of compromise. Finally, raise awareness among development and security teams about secure coding practices to prevent similar vulnerabilities in custom or third-party applications.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2023-04-29T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9816c4522896dcbd6782
Added to database: 5/21/2025, 9:08:38 AM
Last enriched: 7/3/2025, 3:40:58 PM
Last updated: 8/11/2025, 1:37:57 AM
Views: 11
Related Threats
CVE-2025-8293: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Theerawat Patthawee Intl DateTime Calendar
MediumCVE-2025-7686: CWE-352 Cross-Site Request Forgery (CSRF) in lmyoaoa weichuncai(WP伪春菜)
MediumCVE-2025-7684: CWE-352 Cross-Site Request Forgery (CSRF) in remysharp Last.fm Recent Album Artwork
MediumCVE-2025-7683: CWE-352 Cross-Site Request Forgery (CSRF) in janyksteenbeek LatestCheckins
MediumCVE-2025-7668: CWE-352 Cross-Site Request Forgery (CSRF) in timothyja Linux Promotional Plugin
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.