Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12347: Unrestricted Upload in MaxSite CMS

0
Medium
VulnerabilityCVE-2025-12347cvecve-2025-12347
Published: Tue Oct 28 2025 (10/28/2025, 02:02:13 UTC)
Source: CVE Database V5
Vendor/Project: MaxSite
Product: CMS

Description

A flaw has been found in MaxSite CMS up to 109. This issue affects some unknown processing of the file application/maxsite/admin/plugins/editor_files/save-file-ajax.php. Executing manipulation of the argument file_path/content can lead to unrestricted upload. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 11/04/2025, 03:13:40 UTC

Technical Analysis

CVE-2025-12347 is a vulnerability identified in MaxSite CMS up to version 109, specifically in the file application/maxsite/admin/plugins/editor_files/save-file-ajax.php. The issue arises from insufficient validation and processing of the file_path and content parameters, which allows an attacker to upload arbitrary files without restrictions. This unrestricted upload vulnerability can be exploited remotely without authentication or user interaction, making it relatively easy for attackers to leverage. The uploaded files could include malicious scripts or web shells, enabling remote code execution, data theft, or site defacement. The vendor was notified early but has not issued any patches or advisories, leaving users exposed. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no exploits have been observed in the wild yet, the public disclosure and availability of exploit details increase the risk of imminent attacks. The vulnerability affects only version 109 of MaxSite CMS, a content management system used primarily for website management. Given the lack of vendor response, organizations must rely on compensating controls and monitoring until an official fix is released.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to websites and web applications running MaxSite CMS version 109. Successful exploitation can lead to unauthorized file uploads, potentially resulting in remote code execution, website defacement, data leakage, or pivoting within the network. This can disrupt business operations, damage reputation, and lead to regulatory non-compliance, especially under GDPR if personal data is exposed. Public-facing web portals are particularly vulnerable, and attackers could use compromised sites as a foothold for further attacks. The lack of vendor patching increases the window of exposure. Organizations relying on MaxSite CMS for critical services or e-commerce may face operational and financial impacts. The medium CVSS score reflects moderate severity but the ease of exploitation and lack of authentication requirements elevate the urgency for mitigation.

Mitigation Recommendations

1. Immediately audit all MaxSite CMS installations to identify version 109 deployments. 2. Implement strict server-side validation to restrict file uploads by type, size, and content, blocking executable or script files. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious upload attempts targeting save-file-ajax.php. 4. Restrict access to the vulnerable script via IP whitelisting or authentication proxies where feasible. 5. Monitor web server logs and file system changes for unusual upload activity or new files in upload directories. 6. Isolate vulnerable CMS instances from critical internal networks to limit lateral movement. 7. Prepare incident response plans for potential exploitation scenarios. 8. Engage with the MaxSite community or security forums for updates and unofficial patches. 9. Consider migrating to alternative CMS platforms if patching is delayed. 10. Regularly back up website data and configurations to enable recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-27T14:13:59.258Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690028ffba6dffc5e22648c4

Added to database: 10/28/2025, 2:22:55 AM

Last enriched: 11/4/2025, 3:13:40 AM

Last updated: 12/12/2025, 7:29:45 AM

Views: 156

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats