CVE-2025-13198: Unrestricted Upload in DouPHP
A vulnerability has been found in DouPHP up to 1.8 Release 20251022. This impacts an unknown function of the file upload/include/file.class.php. The manipulation of the argument File leads to unrestricted upload. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-13198 is a vulnerability identified in DouPHP, an open-source content management system widely used for building websites, particularly in Asian markets. The flaw resides in the file upload handling mechanism within the file upload/include/file.class.php file. Specifically, the vulnerability arises from insufficient validation and sanitization of the 'File' parameter, which allows an attacker to upload arbitrary files without restriction. This unrestricted upload capability can be exploited remotely, enabling attackers to place malicious files on the server, potentially leading to remote code execution, defacement, or further compromise of the system. The vulnerability requires the attacker to have high privileges (PR:H) but does not require user interaction (UI:N) or authentication tokens (AT:N). The CVSS 4.0 vector indicates network attack vector (AV:N), low complexity (AC:L), and partial impact on confidentiality, integrity, and availability (C:L, I:L, A:L). The vulnerability affects DouPHP up to version 1.8 Release 20251022. No official patches or fixes have been linked yet, and no known exploits are currently active in the wild, but public disclosure increases the risk of exploitation attempts.
Potential Impact
The unrestricted file upload vulnerability in DouPHP can have significant impacts on affected organizations. Attackers with high privileges can upload malicious files, such as web shells or scripts, enabling them to execute arbitrary code, escalate privileges, or maintain persistence on the server. This can lead to data breaches, website defacement, service disruption, and potential lateral movement within the network. The partial impact on confidentiality, integrity, and availability means sensitive data could be exposed or altered, and services could be degraded or taken offline. Organizations relying on DouPHP for their web infrastructure, especially those without robust access controls or monitoring, face increased risk of compromise. The vulnerability's remote exploitability and lack of user interaction requirement further raise the threat level, as attackers can automate attacks without user involvement.
Mitigation Recommendations
To mitigate CVE-2025-13198, organizations should first verify if they are running DouPHP version 1.8 Release 20251022 or earlier. Immediate steps include restricting file upload permissions to trusted users only and implementing strict input validation and sanitization on the server side for all file upload parameters. Employing web application firewalls (WAFs) with custom rules to detect and block suspicious file upload attempts can provide additional protection. Monitoring server logs for unusual file upload activity and scanning uploaded files for malware is critical. If possible, isolate the file upload functionality in a sandboxed environment with minimal privileges to limit potential damage. Organizations should also follow DouPHP vendor channels for official patches or updates and apply them promptly once available. Regular security audits and penetration testing focusing on file upload mechanisms can help identify and remediate similar weaknesses proactively.
Affected Countries
China, Vietnam, Indonesia, Malaysia, Thailand, Philippines, India, United States, Russia, South Korea
CVE-2025-13198: Unrestricted Upload in DouPHP
Description
A vulnerability has been found in DouPHP up to 1.8 Release 20251022. This impacts an unknown function of the file upload/include/file.class.php. The manipulation of the argument File leads to unrestricted upload. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-13198 is a vulnerability identified in DouPHP, an open-source content management system widely used for building websites, particularly in Asian markets. The flaw resides in the file upload handling mechanism within the file upload/include/file.class.php file. Specifically, the vulnerability arises from insufficient validation and sanitization of the 'File' parameter, which allows an attacker to upload arbitrary files without restriction. This unrestricted upload capability can be exploited remotely, enabling attackers to place malicious files on the server, potentially leading to remote code execution, defacement, or further compromise of the system. The vulnerability requires the attacker to have high privileges (PR:H) but does not require user interaction (UI:N) or authentication tokens (AT:N). The CVSS 4.0 vector indicates network attack vector (AV:N), low complexity (AC:L), and partial impact on confidentiality, integrity, and availability (C:L, I:L, A:L). The vulnerability affects DouPHP up to version 1.8 Release 20251022. No official patches or fixes have been linked yet, and no known exploits are currently active in the wild, but public disclosure increases the risk of exploitation attempts.
Potential Impact
The unrestricted file upload vulnerability in DouPHP can have significant impacts on affected organizations. Attackers with high privileges can upload malicious files, such as web shells or scripts, enabling them to execute arbitrary code, escalate privileges, or maintain persistence on the server. This can lead to data breaches, website defacement, service disruption, and potential lateral movement within the network. The partial impact on confidentiality, integrity, and availability means sensitive data could be exposed or altered, and services could be degraded or taken offline. Organizations relying on DouPHP for their web infrastructure, especially those without robust access controls or monitoring, face increased risk of compromise. The vulnerability's remote exploitability and lack of user interaction requirement further raise the threat level, as attackers can automate attacks without user involvement.
Mitigation Recommendations
To mitigate CVE-2025-13198, organizations should first verify if they are running DouPHP version 1.8 Release 20251022 or earlier. Immediate steps include restricting file upload permissions to trusted users only and implementing strict input validation and sanitization on the server side for all file upload parameters. Employing web application firewalls (WAFs) with custom rules to detect and block suspicious file upload attempts can provide additional protection. Monitoring server logs for unusual file upload activity and scanning uploaded files for malware is critical. If possible, isolate the file upload functionality in a sandboxed environment with minimal privileges to limit potential damage. Organizations should also follow DouPHP vendor channels for official patches or updates and apply them promptly once available. Regular security audits and penetration testing focusing on file upload mechanisms can help identify and remediate similar weaknesses proactively.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-14T16:12:45.375Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691844485aa1a593e1c111b7
Added to database: 11/15/2025, 9:13:44 AM
Last enriched: 2/24/2026, 10:22:28 PM
Last updated: 3/24/2026, 10:44:59 PM
Views: 107
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.