Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13198: Unrestricted Upload in DouPHP

0
Medium
VulnerabilityCVE-2025-13198cvecve-2025-13198
Published: Sat Nov 15 2025 (11/15/2025, 09:02:07 UTC)
Source: CVE Database V5
Product: DouPHP

Description

A vulnerability has been found in DouPHP up to 1.8 Release 20251022. This impacts an unknown function of the file upload/include/file.class.php. The manipulation of the argument File leads to unrestricted upload. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:22:28 UTC

Technical Analysis

CVE-2025-13198 is a vulnerability identified in DouPHP, an open-source content management system widely used for building websites, particularly in Asian markets. The flaw resides in the file upload handling mechanism within the file upload/include/file.class.php file. Specifically, the vulnerability arises from insufficient validation and sanitization of the 'File' parameter, which allows an attacker to upload arbitrary files without restriction. This unrestricted upload capability can be exploited remotely, enabling attackers to place malicious files on the server, potentially leading to remote code execution, defacement, or further compromise of the system. The vulnerability requires the attacker to have high privileges (PR:H) but does not require user interaction (UI:N) or authentication tokens (AT:N). The CVSS 4.0 vector indicates network attack vector (AV:N), low complexity (AC:L), and partial impact on confidentiality, integrity, and availability (C:L, I:L, A:L). The vulnerability affects DouPHP up to version 1.8 Release 20251022. No official patches or fixes have been linked yet, and no known exploits are currently active in the wild, but public disclosure increases the risk of exploitation attempts.

Potential Impact

The unrestricted file upload vulnerability in DouPHP can have significant impacts on affected organizations. Attackers with high privileges can upload malicious files, such as web shells or scripts, enabling them to execute arbitrary code, escalate privileges, or maintain persistence on the server. This can lead to data breaches, website defacement, service disruption, and potential lateral movement within the network. The partial impact on confidentiality, integrity, and availability means sensitive data could be exposed or altered, and services could be degraded or taken offline. Organizations relying on DouPHP for their web infrastructure, especially those without robust access controls or monitoring, face increased risk of compromise. The vulnerability's remote exploitability and lack of user interaction requirement further raise the threat level, as attackers can automate attacks without user involvement.

Mitigation Recommendations

To mitigate CVE-2025-13198, organizations should first verify if they are running DouPHP version 1.8 Release 20251022 or earlier. Immediate steps include restricting file upload permissions to trusted users only and implementing strict input validation and sanitization on the server side for all file upload parameters. Employing web application firewalls (WAFs) with custom rules to detect and block suspicious file upload attempts can provide additional protection. Monitoring server logs for unusual file upload activity and scanning uploaded files for malware is critical. If possible, isolate the file upload functionality in a sandboxed environment with minimal privileges to limit potential damage. Organizations should also follow DouPHP vendor channels for official patches or updates and apply them promptly once available. Regular security audits and penetration testing focusing on file upload mechanisms can help identify and remediate similar weaknesses proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-14T16:12:45.375Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691844485aa1a593e1c111b7

Added to database: 11/15/2025, 9:13:44 AM

Last enriched: 2/24/2026, 10:22:28 PM

Last updated: 3/22/2026, 5:41:53 AM

Views: 106

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses