Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10763: Unrestricted Upload in academico-sis academico

0
Medium
VulnerabilityCVE-2025-10763cvecve-2025-10763
Published: Sun Sep 21 2025 (09/21/2025, 05:02:05 UTC)
Source: CVE Database V5
Vendor/Project: academico-sis
Product: academico

Description

A vulnerability was determined in academico-sis academico up to d9a9e2636fbf7e5845ee086bcb03ca62faceb6ab. Affected by this issue is some unknown functionality of the file /edit-photo of the component Profile Picture Handler. This manipulation causes unrestricted upload. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. This product adopts a rolling release strategy to maintain continuous delivery The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/29/2025, 00:46:10 UTC

Technical Analysis

CVE-2025-10763 is a medium-severity vulnerability affecting the academico-sis academico software, specifically in the Profile Picture Handler component accessible via the /edit-photo endpoint. The vulnerability allows an attacker to perform an unrestricted file upload remotely without requiring user interaction or elevated privileges beyond low-level privileges. This means an attacker with minimal access can upload arbitrary files to the server. The unrestricted upload flaw can lead to the placement of malicious files such as web shells or malware, potentially allowing remote code execution, server compromise, or further lateral movement within the affected environment. The product follows a rolling release strategy, but as of the disclosure date, no patch or vendor response has been provided. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, no user interaction, and low impact on confidentiality, integrity, and availability individually, but combined they can still lead to significant risk. The exploit has been publicly disclosed, increasing the risk of exploitation, although no active exploitation in the wild has been reported yet. The lack of vendor response and patch availability heightens the urgency for organizations to implement mitigations proactively. Since the vulnerability affects a component handling profile picture uploads, it is likely used in educational or academic management contexts, where user profile management is common.

Potential Impact

For European organizations, particularly educational institutions or entities using academico-sis academico for academic management, this vulnerability poses a significant risk. Successful exploitation could allow attackers to upload malicious files, leading to unauthorized access, data breaches, or disruption of services. Confidentiality of sensitive student or staff data could be compromised, integrity of academic records altered, and availability of the system disrupted. Given the public disclosure and absence of patches, attackers may target these institutions to gain footholds or exfiltrate data. The impact is exacerbated in environments where the software is internet-facing or insufficiently segmented. Additionally, regulatory frameworks such as GDPR impose strict data protection requirements, and a breach resulting from this vulnerability could lead to legal and financial penalties. The medium severity rating suggests a moderate but tangible risk that should not be ignored, especially in critical academic infrastructures.

Mitigation Recommendations

Since no official patch is available, European organizations should implement immediate compensating controls. These include: 1) Restricting access to the /edit-photo endpoint via network controls such as IP whitelisting or VPN-only access to limit exposure. 2) Implementing strict file upload validation and filtering at the web server or application firewall level to block executable or suspicious file types. 3) Employing web application firewalls (WAFs) with custom rules to detect and block attempts to upload malicious payloads. 4) Monitoring logs for unusual upload activity or file types and setting up alerts for suspicious behavior. 5) Isolating the affected component in a sandboxed environment or container to limit potential damage. 6) Reviewing and tightening user privilege assignments to ensure only necessary users have upload capabilities. 7) Preparing incident response plans specific to web shell or malware detection. 8) Regularly backing up critical data and verifying restore procedures. Organizations should also track vendor communications for any forthcoming patches and plan timely updates once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-20T07:25:53.597Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d0935fb68a0c387d42a931

Added to database: 9/22/2025, 12:07:59 AM

Last enriched: 9/29/2025, 12:46:10 AM

Last updated: 11/5/2025, 9:23:53 AM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats