CVE-2025-12347: Unrestricted Upload in MaxSite CMS
A flaw has been found in MaxSite CMS up to 109. This issue affects some unknown processing of the file application/maxsite/admin/plugins/editor_files/save-file-ajax.php. Executing manipulation of the argument file_path/content can lead to unrestricted upload. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-12347 is a vulnerability identified in MaxSite CMS up to version 109, specifically in the file application/maxsite/admin/plugins/editor_files/save-file-ajax.php. The issue arises from insufficient validation and processing of the file_path and content parameters, which allows an attacker to upload arbitrary files without restrictions. This unrestricted upload vulnerability can be exploited remotely without authentication or user interaction, making it relatively easy for attackers to leverage. The uploaded files could include malicious scripts or web shells, enabling remote code execution, data theft, or site defacement. The vendor was notified early but has not issued any patches or advisories, leaving users exposed. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no exploits have been observed in the wild yet, the public disclosure and availability of exploit details increase the risk of imminent attacks. The vulnerability affects only version 109 of MaxSite CMS, a content management system used primarily for website management. Given the lack of vendor response, organizations must rely on compensating controls and monitoring until an official fix is released.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites and web applications running MaxSite CMS version 109. Successful exploitation can lead to unauthorized file uploads, potentially resulting in remote code execution, website defacement, data leakage, or pivoting within the network. This can disrupt business operations, damage reputation, and lead to regulatory non-compliance, especially under GDPR if personal data is exposed. Public-facing web portals are particularly vulnerable, and attackers could use compromised sites as a foothold for further attacks. The lack of vendor patching increases the window of exposure. Organizations relying on MaxSite CMS for critical services or e-commerce may face operational and financial impacts. The medium CVSS score reflects moderate severity but the ease of exploitation and lack of authentication requirements elevate the urgency for mitigation.
Mitigation Recommendations
1. Immediately audit all MaxSite CMS installations to identify version 109 deployments. 2. Implement strict server-side validation to restrict file uploads by type, size, and content, blocking executable or script files. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious upload attempts targeting save-file-ajax.php. 4. Restrict access to the vulnerable script via IP whitelisting or authentication proxies where feasible. 5. Monitor web server logs and file system changes for unusual upload activity or new files in upload directories. 6. Isolate vulnerable CMS instances from critical internal networks to limit lateral movement. 7. Prepare incident response plans for potential exploitation scenarios. 8. Engage with the MaxSite community or security forums for updates and unofficial patches. 9. Consider migrating to alternative CMS platforms if patching is delayed. 10. Regularly back up website data and configurations to enable recovery in case of compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-12347: Unrestricted Upload in MaxSite CMS
Description
A flaw has been found in MaxSite CMS up to 109. This issue affects some unknown processing of the file application/maxsite/admin/plugins/editor_files/save-file-ajax.php. Executing manipulation of the argument file_path/content can lead to unrestricted upload. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-12347 is a vulnerability identified in MaxSite CMS up to version 109, specifically in the file application/maxsite/admin/plugins/editor_files/save-file-ajax.php. The issue arises from insufficient validation and processing of the file_path and content parameters, which allows an attacker to upload arbitrary files without restrictions. This unrestricted upload vulnerability can be exploited remotely without authentication or user interaction, making it relatively easy for attackers to leverage. The uploaded files could include malicious scripts or web shells, enabling remote code execution, data theft, or site defacement. The vendor was notified early but has not issued any patches or advisories, leaving users exposed. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no exploits have been observed in the wild yet, the public disclosure and availability of exploit details increase the risk of imminent attacks. The vulnerability affects only version 109 of MaxSite CMS, a content management system used primarily for website management. Given the lack of vendor response, organizations must rely on compensating controls and monitoring until an official fix is released.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites and web applications running MaxSite CMS version 109. Successful exploitation can lead to unauthorized file uploads, potentially resulting in remote code execution, website defacement, data leakage, or pivoting within the network. This can disrupt business operations, damage reputation, and lead to regulatory non-compliance, especially under GDPR if personal data is exposed. Public-facing web portals are particularly vulnerable, and attackers could use compromised sites as a foothold for further attacks. The lack of vendor patching increases the window of exposure. Organizations relying on MaxSite CMS for critical services or e-commerce may face operational and financial impacts. The medium CVSS score reflects moderate severity but the ease of exploitation and lack of authentication requirements elevate the urgency for mitigation.
Mitigation Recommendations
1. Immediately audit all MaxSite CMS installations to identify version 109 deployments. 2. Implement strict server-side validation to restrict file uploads by type, size, and content, blocking executable or script files. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious upload attempts targeting save-file-ajax.php. 4. Restrict access to the vulnerable script via IP whitelisting or authentication proxies where feasible. 5. Monitor web server logs and file system changes for unusual upload activity or new files in upload directories. 6. Isolate vulnerable CMS instances from critical internal networks to limit lateral movement. 7. Prepare incident response plans for potential exploitation scenarios. 8. Engage with the MaxSite community or security forums for updates and unofficial patches. 9. Consider migrating to alternative CMS platforms if patching is delayed. 10. Regularly back up website data and configurations to enable recovery in case of compromise.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-27T14:13:59.258Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 690028ffba6dffc5e22648c4
Added to database: 10/28/2025, 2:22:55 AM
Last enriched: 11/4/2025, 3:13:40 AM
Last updated: 2/5/2026, 6:10:17 PM
Views: 183
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1707: Vulnerability in pgadmin.org pgAdmin 4
HighCVE-2025-68121: CWE-295: Improper Certificate Validation in Go standard library crypto/tls
UnknownCVE-2025-58190: CWE-835: Loop with Unreachable Exit Condition in golang.org/x/net golang.org/x/net/html
UnknownCVE-2025-47911: CWE-400: Uncontrolled Resource Consumption in golang.org/x/net golang.org/x/net/html
UnknownCVE-2025-15557: CWE-295 Improper Certificate Validation in TP-Link Systems Inc. Tapo H100 v1
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.