CVE-2025-12347: Unrestricted Upload in MaxSite CMS
A flaw has been found in MaxSite CMS up to 109. This issue affects some unknown processing of the file application/maxsite/admin/plugins/editor_files/save-file-ajax.php. Executing manipulation of the argument file_path/content can lead to unrestricted upload. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-12347 is a vulnerability identified in MaxSite CMS up to version 109, specifically in the file application/maxsite/admin/plugins/editor_files/save-file-ajax.php. The issue arises from insufficient validation and processing of the file_path and content parameters, which allows an attacker to upload arbitrary files without restrictions. This unrestricted upload vulnerability can be exploited remotely without authentication or user interaction, making it relatively easy for attackers to leverage. The uploaded files could include malicious scripts or web shells, enabling remote code execution, data theft, or site defacement. The vendor was notified early but has not issued any patches or advisories, leaving users exposed. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no exploits have been observed in the wild yet, the public disclosure and availability of exploit details increase the risk of imminent attacks. The vulnerability affects only version 109 of MaxSite CMS, a content management system used primarily for website management. Given the lack of vendor response, organizations must rely on compensating controls and monitoring until an official fix is released.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites and web applications running MaxSite CMS version 109. Successful exploitation can lead to unauthorized file uploads, potentially resulting in remote code execution, website defacement, data leakage, or pivoting within the network. This can disrupt business operations, damage reputation, and lead to regulatory non-compliance, especially under GDPR if personal data is exposed. Public-facing web portals are particularly vulnerable, and attackers could use compromised sites as a foothold for further attacks. The lack of vendor patching increases the window of exposure. Organizations relying on MaxSite CMS for critical services or e-commerce may face operational and financial impacts. The medium CVSS score reflects moderate severity but the ease of exploitation and lack of authentication requirements elevate the urgency for mitigation.
Mitigation Recommendations
1. Immediately audit all MaxSite CMS installations to identify version 109 deployments. 2. Implement strict server-side validation to restrict file uploads by type, size, and content, blocking executable or script files. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious upload attempts targeting save-file-ajax.php. 4. Restrict access to the vulnerable script via IP whitelisting or authentication proxies where feasible. 5. Monitor web server logs and file system changes for unusual upload activity or new files in upload directories. 6. Isolate vulnerable CMS instances from critical internal networks to limit lateral movement. 7. Prepare incident response plans for potential exploitation scenarios. 8. Engage with the MaxSite community or security forums for updates and unofficial patches. 9. Consider migrating to alternative CMS platforms if patching is delayed. 10. Regularly back up website data and configurations to enable recovery in case of compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-12347: Unrestricted Upload in MaxSite CMS
Description
A flaw has been found in MaxSite CMS up to 109. This issue affects some unknown processing of the file application/maxsite/admin/plugins/editor_files/save-file-ajax.php. Executing manipulation of the argument file_path/content can lead to unrestricted upload. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-12347 is a vulnerability identified in MaxSite CMS up to version 109, specifically in the file application/maxsite/admin/plugins/editor_files/save-file-ajax.php. The issue arises from insufficient validation and processing of the file_path and content parameters, which allows an attacker to upload arbitrary files without restrictions. This unrestricted upload vulnerability can be exploited remotely without authentication or user interaction, making it relatively easy for attackers to leverage. The uploaded files could include malicious scripts or web shells, enabling remote code execution, data theft, or site defacement. The vendor was notified early but has not issued any patches or advisories, leaving users exposed. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no exploits have been observed in the wild yet, the public disclosure and availability of exploit details increase the risk of imminent attacks. The vulnerability affects only version 109 of MaxSite CMS, a content management system used primarily for website management. Given the lack of vendor response, organizations must rely on compensating controls and monitoring until an official fix is released.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites and web applications running MaxSite CMS version 109. Successful exploitation can lead to unauthorized file uploads, potentially resulting in remote code execution, website defacement, data leakage, or pivoting within the network. This can disrupt business operations, damage reputation, and lead to regulatory non-compliance, especially under GDPR if personal data is exposed. Public-facing web portals are particularly vulnerable, and attackers could use compromised sites as a foothold for further attacks. The lack of vendor patching increases the window of exposure. Organizations relying on MaxSite CMS for critical services or e-commerce may face operational and financial impacts. The medium CVSS score reflects moderate severity but the ease of exploitation and lack of authentication requirements elevate the urgency for mitigation.
Mitigation Recommendations
1. Immediately audit all MaxSite CMS installations to identify version 109 deployments. 2. Implement strict server-side validation to restrict file uploads by type, size, and content, blocking executable or script files. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious upload attempts targeting save-file-ajax.php. 4. Restrict access to the vulnerable script via IP whitelisting or authentication proxies where feasible. 5. Monitor web server logs and file system changes for unusual upload activity or new files in upload directories. 6. Isolate vulnerable CMS instances from critical internal networks to limit lateral movement. 7. Prepare incident response plans for potential exploitation scenarios. 8. Engage with the MaxSite community or security forums for updates and unofficial patches. 9. Consider migrating to alternative CMS platforms if patching is delayed. 10. Regularly back up website data and configurations to enable recovery in case of compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-27T14:13:59.258Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 690028ffba6dffc5e22648c4
Added to database: 10/28/2025, 2:22:55 AM
Last enriched: 11/4/2025, 3:13:40 AM
Last updated: 12/12/2025, 7:29:45 AM
Views: 156
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67726: CWE-834: Excessive Iteration in tornadoweb tornado
HighCVE-2025-67730: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in frappe lms
MediumCVE-2025-4970: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bannersky BSK PDF Manager
MediumCVE-2025-14169: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in amans2k FunnelKit – Funnel Builder for WooCommerce Checkout
HighCVE-2025-14049: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in e4jvikwp VikRentItems Flexible Rental Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.