CVE-2025-13198: Unrestricted Upload in DouPHP
A vulnerability has been found in DouPHP up to 1.8 Release 20251022. This impacts an unknown function of the file upload/include/file.class.php. The manipulation of the argument File leads to unrestricted upload. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-13198 is a vulnerability identified in DouPHP, an open-source content management system, specifically affecting version 1.8 Release 20251022. The flaw resides in the file upload/include/file.class.php file, where improper validation or sanitization of the 'File' argument allows an attacker to perform unrestricted file uploads. This means an attacker with sufficient privileges can upload arbitrary files, potentially including malicious scripts or executables, leading to remote code execution or system compromise. The vulnerability is exploitable remotely without requiring user interaction, but it does require the attacker to have high-level privileges (PR:H) on the system, which limits the initial attack vector to insiders or attackers who have already gained elevated access. The CVSS 4.0 base score is 5.1, reflecting a medium severity due to the combination of remote exploitability and the requirement for high privileges. The impact on confidentiality, integrity, and availability is low to limited, as the vulnerability itself does not directly grant access but can be leveraged for further attacks. No patches or mitigations are currently linked, and no known exploits have been observed in the wild, but public disclosure increases the risk of exploitation attempts. Organizations using DouPHP 1.8 should be aware of this vulnerability and monitor for updates or patches from the vendor.
Potential Impact
For European organizations, the unrestricted file upload vulnerability in DouPHP 1.8 poses a moderate risk primarily to internal security and system integrity. If exploited, attackers with high privileges could upload malicious files, potentially leading to remote code execution, data tampering, or service disruption. This could compromise sensitive data confidentiality and system availability, especially if the uploaded files are web shells or malware. The impact is heightened in environments where DouPHP is used for critical web applications or intranet portals. Given the remote exploitability and lack of user interaction requirement, attackers who have already breached perimeter defenses or gained elevated access could leverage this vulnerability to deepen their foothold. The absence of known exploits in the wild currently reduces immediate risk, but public disclosure necessitates proactive measures. European organizations in sectors such as government, education, and SMEs that rely on DouPHP for content management should consider this vulnerability a potential vector for privilege escalation and lateral movement within their networks.
Mitigation Recommendations
1. Immediately restrict access to the file upload functionality to trusted administrators only, minimizing the number of users with high privileges who can upload files. 2. Implement strict input validation and sanitization on all file upload parameters, particularly the 'File' argument, to prevent unauthorized file types or payloads. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious file upload attempts targeting DouPHP endpoints. 4. Monitor server logs and file system changes for unusual upload activity or the presence of unexpected files, especially executable scripts. 5. Isolate DouPHP installations in segmented network zones to limit lateral movement if compromise occurs. 6. Regularly update DouPHP to newer versions once patches addressing this vulnerability are released. 7. Conduct internal audits to verify that no unauthorized files have been uploaded and remove any suspicious content. 8. Educate administrators on the risks of privilege misuse and enforce the principle of least privilege to reduce the attack surface. 9. If patching is not immediately possible, consider disabling the vulnerable upload functionality temporarily or applying custom code fixes to validate uploads securely.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-13198: Unrestricted Upload in DouPHP
Description
A vulnerability has been found in DouPHP up to 1.8 Release 20251022. This impacts an unknown function of the file upload/include/file.class.php. The manipulation of the argument File leads to unrestricted upload. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-13198 is a vulnerability identified in DouPHP, an open-source content management system, specifically affecting version 1.8 Release 20251022. The flaw resides in the file upload/include/file.class.php file, where improper validation or sanitization of the 'File' argument allows an attacker to perform unrestricted file uploads. This means an attacker with sufficient privileges can upload arbitrary files, potentially including malicious scripts or executables, leading to remote code execution or system compromise. The vulnerability is exploitable remotely without requiring user interaction, but it does require the attacker to have high-level privileges (PR:H) on the system, which limits the initial attack vector to insiders or attackers who have already gained elevated access. The CVSS 4.0 base score is 5.1, reflecting a medium severity due to the combination of remote exploitability and the requirement for high privileges. The impact on confidentiality, integrity, and availability is low to limited, as the vulnerability itself does not directly grant access but can be leveraged for further attacks. No patches or mitigations are currently linked, and no known exploits have been observed in the wild, but public disclosure increases the risk of exploitation attempts. Organizations using DouPHP 1.8 should be aware of this vulnerability and monitor for updates or patches from the vendor.
Potential Impact
For European organizations, the unrestricted file upload vulnerability in DouPHP 1.8 poses a moderate risk primarily to internal security and system integrity. If exploited, attackers with high privileges could upload malicious files, potentially leading to remote code execution, data tampering, or service disruption. This could compromise sensitive data confidentiality and system availability, especially if the uploaded files are web shells or malware. The impact is heightened in environments where DouPHP is used for critical web applications or intranet portals. Given the remote exploitability and lack of user interaction requirement, attackers who have already breached perimeter defenses or gained elevated access could leverage this vulnerability to deepen their foothold. The absence of known exploits in the wild currently reduces immediate risk, but public disclosure necessitates proactive measures. European organizations in sectors such as government, education, and SMEs that rely on DouPHP for content management should consider this vulnerability a potential vector for privilege escalation and lateral movement within their networks.
Mitigation Recommendations
1. Immediately restrict access to the file upload functionality to trusted administrators only, minimizing the number of users with high privileges who can upload files. 2. Implement strict input validation and sanitization on all file upload parameters, particularly the 'File' argument, to prevent unauthorized file types or payloads. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious file upload attempts targeting DouPHP endpoints. 4. Monitor server logs and file system changes for unusual upload activity or the presence of unexpected files, especially executable scripts. 5. Isolate DouPHP installations in segmented network zones to limit lateral movement if compromise occurs. 6. Regularly update DouPHP to newer versions once patches addressing this vulnerability are released. 7. Conduct internal audits to verify that no unauthorized files have been uploaded and remove any suspicious content. 8. Educate administrators on the risks of privilege misuse and enforce the principle of least privilege to reduce the attack surface. 9. If patching is not immediately possible, consider disabling the vulnerable upload functionality temporarily or applying custom code fixes to validate uploads securely.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-14T16:12:45.375Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691844485aa1a593e1c111b7
Added to database: 11/15/2025, 9:13:44 AM
Last enriched: 11/15/2025, 9:17:49 AM
Last updated: 11/15/2025, 4:56:14 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13201: SQL Injection in code-projects Simple Cafe Ordering System
MediumCyberRecon project
MediumCVE-2025-13200: Exposure of Information Through Directory Listing in SourceCodester Farm Management System
MediumCVE-2025-13199: Path Traversal: '../filedir' in code-projects Email Logging Interface
MediumCVE-2024-0562: Use After Free
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.