Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13198: Unrestricted Upload in DouPHP

0
Medium
VulnerabilityCVE-2025-13198cvecve-2025-13198
Published: Sat Nov 15 2025 (11/15/2025, 09:02:07 UTC)
Source: CVE Database V5
Product: DouPHP

Description

A vulnerability has been found in DouPHP up to 1.8 Release 20251022. This impacts an unknown function of the file upload/include/file.class.php. The manipulation of the argument File leads to unrestricted upload. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 11/15/2025, 09:17:49 UTC

Technical Analysis

CVE-2025-13198 is a vulnerability identified in DouPHP, an open-source content management system, specifically affecting version 1.8 Release 20251022. The flaw resides in the file upload/include/file.class.php file, where improper validation or sanitization of the 'File' argument allows an attacker to perform unrestricted file uploads. This means an attacker with sufficient privileges can upload arbitrary files, potentially including malicious scripts or executables, leading to remote code execution or system compromise. The vulnerability is exploitable remotely without requiring user interaction, but it does require the attacker to have high-level privileges (PR:H) on the system, which limits the initial attack vector to insiders or attackers who have already gained elevated access. The CVSS 4.0 base score is 5.1, reflecting a medium severity due to the combination of remote exploitability and the requirement for high privileges. The impact on confidentiality, integrity, and availability is low to limited, as the vulnerability itself does not directly grant access but can be leveraged for further attacks. No patches or mitigations are currently linked, and no known exploits have been observed in the wild, but public disclosure increases the risk of exploitation attempts. Organizations using DouPHP 1.8 should be aware of this vulnerability and monitor for updates or patches from the vendor.

Potential Impact

For European organizations, the unrestricted file upload vulnerability in DouPHP 1.8 poses a moderate risk primarily to internal security and system integrity. If exploited, attackers with high privileges could upload malicious files, potentially leading to remote code execution, data tampering, or service disruption. This could compromise sensitive data confidentiality and system availability, especially if the uploaded files are web shells or malware. The impact is heightened in environments where DouPHP is used for critical web applications or intranet portals. Given the remote exploitability and lack of user interaction requirement, attackers who have already breached perimeter defenses or gained elevated access could leverage this vulnerability to deepen their foothold. The absence of known exploits in the wild currently reduces immediate risk, but public disclosure necessitates proactive measures. European organizations in sectors such as government, education, and SMEs that rely on DouPHP for content management should consider this vulnerability a potential vector for privilege escalation and lateral movement within their networks.

Mitigation Recommendations

1. Immediately restrict access to the file upload functionality to trusted administrators only, minimizing the number of users with high privileges who can upload files. 2. Implement strict input validation and sanitization on all file upload parameters, particularly the 'File' argument, to prevent unauthorized file types or payloads. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious file upload attempts targeting DouPHP endpoints. 4. Monitor server logs and file system changes for unusual upload activity or the presence of unexpected files, especially executable scripts. 5. Isolate DouPHP installations in segmented network zones to limit lateral movement if compromise occurs. 6. Regularly update DouPHP to newer versions once patches addressing this vulnerability are released. 7. Conduct internal audits to verify that no unauthorized files have been uploaded and remove any suspicious content. 8. Educate administrators on the risks of privilege misuse and enforce the principle of least privilege to reduce the attack surface. 9. If patching is not immediately possible, consider disabling the vulnerable upload functionality temporarily or applying custom code fixes to validate uploads securely.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-14T16:12:45.375Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691844485aa1a593e1c111b7

Added to database: 11/15/2025, 9:13:44 AM

Last enriched: 11/15/2025, 9:17:49 AM

Last updated: 11/15/2025, 4:56:14 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats