Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12867: CWE-434 Unrestricted Upload of File with Dangerous Type in Hundred Plus EIP Plus

0
High
VulnerabilityCVE-2025-12867cvecve-2025-12867cwe-434
Published: Mon Nov 10 2025 (11/10/2025, 03:02:49 UTC)
Source: CVE Database V5
Vendor/Project: Hundred Plus
Product: EIP Plus

Description

EIP Plus developed by Hundred Plus has an Arbitrary File Uplaod vulnerability, allowing privileged remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.

AI-Powered Analysis

AILast updated: 11/17/2025, 04:40:29 UTC

Technical Analysis

CVE-2025-12867 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting the EIP Plus product developed by Hundred Plus. This vulnerability allows attackers with privileged remote access to upload arbitrary files, including web shell backdoors, without proper validation or restriction on file types. The consequence is that attackers can execute arbitrary code on the server hosting EIP Plus, potentially gaining full control over the system. The vulnerability does not require user interaction and can be exploited remotely over the network, but it does require the attacker to have high privileges on the system. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no authentication required (AT:N), but privileges required (PR:H), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H/VI:H/VA:H). No public exploits are currently known, and no patches have been linked yet, indicating that organizations need to be proactive in mitigation. The vulnerability is critical because it enables attackers to bypass file upload restrictions, a common security control, and implant persistent backdoors, which can be leveraged for further lateral movement or data exfiltration.

Potential Impact

For European organizations, the impact of CVE-2025-12867 can be significant, especially for those using EIP Plus in critical business processes or infrastructure management. Successful exploitation can lead to full system compromise, data breaches, disruption of services, and potential regulatory non-compliance under GDPR due to unauthorized access and data exposure. Organizations in sectors such as finance, healthcare, government, and manufacturing that rely on EIP Plus for enterprise information processing are particularly vulnerable. The ability to execute arbitrary code remotely can facilitate ransomware deployment, espionage, or sabotage. The lack of public exploits currently provides a window for mitigation, but the high severity score underscores the urgency. Additionally, the requirement for privileged access means internal threat actors or attackers who have already breached perimeter defenses pose a high risk. The overall availability and integrity of critical systems can be severely impacted, leading to operational downtime and reputational damage.

Mitigation Recommendations

To mitigate CVE-2025-12867, organizations should implement strict file upload validation mechanisms that whitelist allowed file types and enforce content inspection to prevent dangerous files from being accepted. Access controls must be tightened to limit privileged remote access only to trusted administrators and through secure channels such as VPNs with multi-factor authentication. Network segmentation should isolate EIP Plus servers from less trusted network zones to reduce attack surface. Monitoring and logging of file upload activities should be enhanced to detect anomalous behavior indicative of exploitation attempts. Until official patches are released, organizations can deploy web application firewalls (WAFs) with custom rules to block suspicious file uploads and known web shell signatures. Regular security audits and penetration testing focused on file upload functionality are recommended. Additionally, educating administrators about the risks of privilege misuse and enforcing the principle of least privilege can reduce the likelihood of exploitation. Backup and incident response plans should be updated to quickly recover from potential compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
twcert
Date Reserved
2025-11-07T11:10:54.815Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69115ed4b9239aa3908085a6

Added to database: 11/10/2025, 3:41:08 AM

Last enriched: 11/17/2025, 4:40:29 AM

Last updated: 12/24/2025, 2:02:05 AM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats