CVE-2025-10763: Unrestricted Upload in academico-sis academico
A vulnerability was determined in academico-sis academico up to d9a9e2636fbf7e5845ee086bcb03ca62faceb6ab. Affected by this issue is some unknown functionality of the file /edit-photo of the component Profile Picture Handler. This manipulation causes unrestricted upload. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. This product adopts a rolling release strategy to maintain continuous delivery The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-10763 is a medium-severity vulnerability affecting the academico-sis academico software, specifically in the Profile Picture Handler component accessible via the /edit-photo endpoint. The vulnerability allows an attacker to perform an unrestricted file upload remotely without requiring user interaction or elevated privileges beyond low-level privileges. This means an attacker with minimal access can upload arbitrary files to the server. The unrestricted upload flaw can lead to the placement of malicious files such as web shells or malware, potentially allowing remote code execution, server compromise, or further lateral movement within the affected environment. The product follows a rolling release strategy, but as of the disclosure date, no patch or vendor response has been provided. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, no user interaction, and low impact on confidentiality, integrity, and availability individually, but combined they can still lead to significant risk. The exploit has been publicly disclosed, increasing the risk of exploitation, although no active exploitation in the wild has been reported yet. The lack of vendor response and patch availability heightens the urgency for organizations to implement mitigations proactively. Since the vulnerability affects a component handling profile picture uploads, it is likely used in educational or academic management contexts, where user profile management is common.
Potential Impact
For European organizations, particularly educational institutions or entities using academico-sis academico for academic management, this vulnerability poses a significant risk. Successful exploitation could allow attackers to upload malicious files, leading to unauthorized access, data breaches, or disruption of services. Confidentiality of sensitive student or staff data could be compromised, integrity of academic records altered, and availability of the system disrupted. Given the public disclosure and absence of patches, attackers may target these institutions to gain footholds or exfiltrate data. The impact is exacerbated in environments where the software is internet-facing or insufficiently segmented. Additionally, regulatory frameworks such as GDPR impose strict data protection requirements, and a breach resulting from this vulnerability could lead to legal and financial penalties. The medium severity rating suggests a moderate but tangible risk that should not be ignored, especially in critical academic infrastructures.
Mitigation Recommendations
Since no official patch is available, European organizations should implement immediate compensating controls. These include: 1) Restricting access to the /edit-photo endpoint via network controls such as IP whitelisting or VPN-only access to limit exposure. 2) Implementing strict file upload validation and filtering at the web server or application firewall level to block executable or suspicious file types. 3) Employing web application firewalls (WAFs) with custom rules to detect and block attempts to upload malicious payloads. 4) Monitoring logs for unusual upload activity or file types and setting up alerts for suspicious behavior. 5) Isolating the affected component in a sandboxed environment or container to limit potential damage. 6) Reviewing and tightening user privilege assignments to ensure only necessary users have upload capabilities. 7) Preparing incident response plans specific to web shell or malware detection. 8) Regularly backing up critical data and verifying restore procedures. Organizations should also track vendor communications for any forthcoming patches and plan timely updates once available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-10763: Unrestricted Upload in academico-sis academico
Description
A vulnerability was determined in academico-sis academico up to d9a9e2636fbf7e5845ee086bcb03ca62faceb6ab. Affected by this issue is some unknown functionality of the file /edit-photo of the component Profile Picture Handler. This manipulation causes unrestricted upload. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. This product adopts a rolling release strategy to maintain continuous delivery The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-10763 is a medium-severity vulnerability affecting the academico-sis academico software, specifically in the Profile Picture Handler component accessible via the /edit-photo endpoint. The vulnerability allows an attacker to perform an unrestricted file upload remotely without requiring user interaction or elevated privileges beyond low-level privileges. This means an attacker with minimal access can upload arbitrary files to the server. The unrestricted upload flaw can lead to the placement of malicious files such as web shells or malware, potentially allowing remote code execution, server compromise, or further lateral movement within the affected environment. The product follows a rolling release strategy, but as of the disclosure date, no patch or vendor response has been provided. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, no user interaction, and low impact on confidentiality, integrity, and availability individually, but combined they can still lead to significant risk. The exploit has been publicly disclosed, increasing the risk of exploitation, although no active exploitation in the wild has been reported yet. The lack of vendor response and patch availability heightens the urgency for organizations to implement mitigations proactively. Since the vulnerability affects a component handling profile picture uploads, it is likely used in educational or academic management contexts, where user profile management is common.
Potential Impact
For European organizations, particularly educational institutions or entities using academico-sis academico for academic management, this vulnerability poses a significant risk. Successful exploitation could allow attackers to upload malicious files, leading to unauthorized access, data breaches, or disruption of services. Confidentiality of sensitive student or staff data could be compromised, integrity of academic records altered, and availability of the system disrupted. Given the public disclosure and absence of patches, attackers may target these institutions to gain footholds or exfiltrate data. The impact is exacerbated in environments where the software is internet-facing or insufficiently segmented. Additionally, regulatory frameworks such as GDPR impose strict data protection requirements, and a breach resulting from this vulnerability could lead to legal and financial penalties. The medium severity rating suggests a moderate but tangible risk that should not be ignored, especially in critical academic infrastructures.
Mitigation Recommendations
Since no official patch is available, European organizations should implement immediate compensating controls. These include: 1) Restricting access to the /edit-photo endpoint via network controls such as IP whitelisting or VPN-only access to limit exposure. 2) Implementing strict file upload validation and filtering at the web server or application firewall level to block executable or suspicious file types. 3) Employing web application firewalls (WAFs) with custom rules to detect and block attempts to upload malicious payloads. 4) Monitoring logs for unusual upload activity or file types and setting up alerts for suspicious behavior. 5) Isolating the affected component in a sandboxed environment or container to limit potential damage. 6) Reviewing and tightening user privilege assignments to ensure only necessary users have upload capabilities. 7) Preparing incident response plans specific to web shell or malware detection. 8) Regularly backing up critical data and verifying restore procedures. Organizations should also track vendor communications for any forthcoming patches and plan timely updates once available.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-20T07:25:53.597Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d0935fb68a0c387d42a931
Added to database: 9/22/2025, 12:07:59 AM
Last enriched: 9/29/2025, 12:46:10 AM
Last updated: 11/5/2025, 9:23:53 AM
Views: 59
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-10622: Client-Side Enforcement of Server-Side Security in Red Hat Red Hat Satellite 6.18 for RHEL 9
HighCVE-2025-12677: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in mykiot KiotViet Sync
MediumCVE-2025-12676: CWE-259 Use of Hard-coded Password in mykiot KiotViet Sync
MediumCVE-2025-12675: CWE-862 Missing Authorization in mykiot KiotViet Sync
MediumCVE-2025-12674: CWE-434 Unrestricted Upload of File with Dangerous Type in mykiot KiotViet Sync
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.