CVE-2025-12346: Unrestricted Upload in MaxSite CMS
A vulnerability was detected in MaxSite CMS up to 109. This vulnerability affects unknown code of the file application/maxsite/admin/plugins/auto_post/uploads-require-maxsite.php of the component HTTP Header Handler. Performing manipulation of the argument X-Requested-FileName/X-Requested-FileUpDir results in unrestricted upload. Remote exploitation of the attack is possible. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-12346 is a vulnerability identified in MaxSite CMS up to version 109, specifically within the file application/maxsite/admin/plugins/auto_post/uploads-require-maxsite.php, which handles HTTP headers related to file uploads. The vulnerability arises from insufficient validation of the HTTP headers X-Requested-FileName and X-Requested-FileUpDir, allowing an attacker to manipulate these arguments to perform unrestricted file uploads remotely. This means an attacker can upload arbitrary files, potentially including malicious scripts or executables, to the server hosting the CMS without requiring authentication or user interaction. The vulnerability is classified as medium severity with a CVSS 4.0 score of 5.3, reflecting its network attack vector, low complexity, no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is limited but present, as attackers could upload files that lead to information disclosure, data tampering, or denial of service. The vendor has been contacted but has not responded or provided a patch, and while no active exploitation has been reported, the exploit code is publicly available, increasing the likelihood of future attacks. The vulnerability affects only version 109 of MaxSite CMS, a content management system used primarily for website management. The lack of patch and vendor response necessitates immediate defensive measures by users of this CMS.
Potential Impact
For European organizations using MaxSite CMS version 109, this vulnerability poses a significant risk of unauthorized file uploads, which can lead to server compromise, data breaches, defacement, or deployment of ransomware and other malware. The ability to upload arbitrary files without authentication can allow attackers to execute remote code, escalate privileges, or establish persistent access. This undermines the confidentiality, integrity, and availability of affected systems. Organizations relying on MaxSite CMS for public-facing websites or internal portals may experience service disruption, reputational damage, and regulatory compliance issues, especially under GDPR requirements for data protection. The medium severity rating indicates a moderate but tangible threat that should not be ignored. The absence of vendor patches increases the window of exposure, making proactive mitigation critical. European entities with sensitive or critical web infrastructure using this CMS are particularly vulnerable to targeted attacks leveraging this flaw.
Mitigation Recommendations
1. Immediately restrict file upload permissions on the affected MaxSite CMS instances by disabling or limiting the functionality of the vulnerable upload component if possible. 2. Implement strict input validation and sanitization on HTTP headers, especially X-Requested-FileName and X-Requested-FileUpDir, at the web server or application firewall level to block malicious manipulation attempts. 3. Employ a Web Application Firewall (WAF) with custom rules to detect and block suspicious upload requests targeting this vulnerability. 4. Isolate vulnerable CMS installations from critical network segments to limit potential lateral movement in case of compromise. 5. Monitor server logs and network traffic for unusual file upload activity or HTTP header anomalies indicative of exploitation attempts. 6. Regularly back up website data and configurations to enable rapid recovery if an attack occurs. 7. Engage with the MaxSite CMS community or security forums to track any unofficial patches or mitigations until an official fix is released. 8. Consider migrating to alternative CMS platforms if patching or mitigation is not feasible in the short term. 9. Educate IT and security teams about this vulnerability and ensure incident response plans include scenarios involving unauthorized file uploads.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2025-12346: Unrestricted Upload in MaxSite CMS
Description
A vulnerability was detected in MaxSite CMS up to 109. This vulnerability affects unknown code of the file application/maxsite/admin/plugins/auto_post/uploads-require-maxsite.php of the component HTTP Header Handler. Performing manipulation of the argument X-Requested-FileName/X-Requested-FileUpDir results in unrestricted upload. Remote exploitation of the attack is possible. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-12346 is a vulnerability identified in MaxSite CMS up to version 109, specifically within the file application/maxsite/admin/plugins/auto_post/uploads-require-maxsite.php, which handles HTTP headers related to file uploads. The vulnerability arises from insufficient validation of the HTTP headers X-Requested-FileName and X-Requested-FileUpDir, allowing an attacker to manipulate these arguments to perform unrestricted file uploads remotely. This means an attacker can upload arbitrary files, potentially including malicious scripts or executables, to the server hosting the CMS without requiring authentication or user interaction. The vulnerability is classified as medium severity with a CVSS 4.0 score of 5.3, reflecting its network attack vector, low complexity, no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is limited but present, as attackers could upload files that lead to information disclosure, data tampering, or denial of service. The vendor has been contacted but has not responded or provided a patch, and while no active exploitation has been reported, the exploit code is publicly available, increasing the likelihood of future attacks. The vulnerability affects only version 109 of MaxSite CMS, a content management system used primarily for website management. The lack of patch and vendor response necessitates immediate defensive measures by users of this CMS.
Potential Impact
For European organizations using MaxSite CMS version 109, this vulnerability poses a significant risk of unauthorized file uploads, which can lead to server compromise, data breaches, defacement, or deployment of ransomware and other malware. The ability to upload arbitrary files without authentication can allow attackers to execute remote code, escalate privileges, or establish persistent access. This undermines the confidentiality, integrity, and availability of affected systems. Organizations relying on MaxSite CMS for public-facing websites or internal portals may experience service disruption, reputational damage, and regulatory compliance issues, especially under GDPR requirements for data protection. The medium severity rating indicates a moderate but tangible threat that should not be ignored. The absence of vendor patches increases the window of exposure, making proactive mitigation critical. European entities with sensitive or critical web infrastructure using this CMS are particularly vulnerable to targeted attacks leveraging this flaw.
Mitigation Recommendations
1. Immediately restrict file upload permissions on the affected MaxSite CMS instances by disabling or limiting the functionality of the vulnerable upload component if possible. 2. Implement strict input validation and sanitization on HTTP headers, especially X-Requested-FileName and X-Requested-FileUpDir, at the web server or application firewall level to block malicious manipulation attempts. 3. Employ a Web Application Firewall (WAF) with custom rules to detect and block suspicious upload requests targeting this vulnerability. 4. Isolate vulnerable CMS installations from critical network segments to limit potential lateral movement in case of compromise. 5. Monitor server logs and network traffic for unusual file upload activity or HTTP header anomalies indicative of exploitation attempts. 6. Regularly back up website data and configurations to enable rapid recovery if an attack occurs. 7. Engage with the MaxSite CMS community or security forums to track any unofficial patches or mitigations until an official fix is released. 8. Consider migrating to alternative CMS platforms if patching or mitigation is not feasible in the short term. 9. Educate IT and security teams about this vulnerability and ensure incident response plans include scenarios involving unauthorized file uploads.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-27T14:13:50.975Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 690028ffba6dffc5e22648be
Added to database: 10/28/2025, 2:22:55 AM
Last enriched: 10/28/2025, 2:38:19 AM
Last updated: 10/28/2025, 4:29:53 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-10939: Uncontrolled Search Path Element in Red Hat Red Hat Build of Keycloak
LowCVE-2025-12347: Unrestricted Upload in MaxSite CMS
MediumCVE-2024-1139: Exposure of Sensitive Information to an Unauthorized Actor
HighCVE-2025-12344: Unrestricted Upload in Yonyou U8 Cloud
MediumCVE-2025-12342: SQL Injection in Serdar Bayram Ghost Hot Spot
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.