Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12347: Unrestricted Upload in MaxSite CMS

0
Medium
VulnerabilityCVE-2025-12347cvecve-2025-12347
Published: Tue Oct 28 2025 (10/28/2025, 02:02:13 UTC)
Source: CVE Database V5
Vendor/Project: MaxSite
Product: CMS

Description

A flaw has been found in MaxSite CMS up to 109. This issue affects some unknown processing of the file application/maxsite/admin/plugins/editor_files/save-file-ajax.php. Executing manipulation of the argument file_path/content can lead to unrestricted upload. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 10/28/2025, 02:37:45 UTC

Technical Analysis

CVE-2025-12347 is a vulnerability identified in MaxSite CMS up to version 109, specifically within the file application/maxsite/admin/plugins/editor_files/save-file-ajax.php. The vulnerability arises from improper handling of the file_path and content parameters, which allows an attacker to upload files without restriction. This unrestricted upload flaw means that an attacker can remotely send crafted requests to the vulnerable script to place arbitrary files on the server, bypassing any intended file type or size restrictions. Since the vulnerability does not require authentication or user interaction, it can be exploited by any remote attacker with network access to the CMS. The uploaded files could be web shells or malicious scripts, enabling further compromise such as remote code execution, data theft, or defacement. The CVSS 4.0 score of 5.3 reflects a medium severity, considering the ease of exploitation (network attack vector, no user interaction), but limited impact on confidentiality, integrity, and availability (low to limited impact). The vendor has not responded to the disclosure, and no official patch is available, increasing the urgency for organizations to apply compensating controls. Although no known exploits in the wild have been reported yet, the public availability of exploit details raises the risk of imminent attacks.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to unauthorized file uploads, enabling attackers to execute arbitrary code, deface websites, or establish persistent backdoors. This can compromise the confidentiality and integrity of sensitive data managed through the CMS, disrupt business operations, and damage organizational reputation. Organizations relying on MaxSite CMS for public-facing websites or internal portals are at risk of service disruption and data breaches. The medium severity suggests that while the impact may not be catastrophic, it is significant enough to warrant immediate attention, especially for entities in sectors such as government, finance, and critical infrastructure where web integrity is paramount. Additionally, the lack of vendor response and patch availability increases the risk exposure period for European entities using this CMS.

Mitigation Recommendations

1. Immediately restrict access to the vulnerable save-file-ajax.php script by implementing IP whitelisting or network-level access controls to limit exposure to trusted users only. 2. Deploy a Web Application Firewall (WAF) with custom rules to detect and block suspicious file upload attempts targeting the vulnerable parameters. 3. Monitor web server logs and CMS activity for unusual file upload patterns or unauthorized file creations, focusing on the affected script path. 4. If possible, disable or remove the vulnerable plugin or functionality until a vendor patch is released. 5. Conduct a thorough audit of existing uploaded files to identify and remove any malicious files that may have been uploaded previously. 6. Implement strict file upload validation and sanitization controls within the CMS or via reverse proxies. 7. Stay informed on vendor updates or community patches and apply them promptly once available. 8. Consider migrating to alternative CMS platforms with active security support if long-term vendor support is uncertain.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-27T14:13:59.258Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690028ffba6dffc5e22648c4

Added to database: 10/28/2025, 2:22:55 AM

Last enriched: 10/28/2025, 2:37:45 AM

Last updated: 10/28/2025, 4:29:52 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats