CVE-2025-13275: Unrestricted Upload in Iqbolshoh php-business-website
A security vulnerability has been detected in Iqbolshoh php-business-website up to 10677743a8dfc281f85291a27cf63a0bce043c24. This affects an unknown part of the file /admin/about.php. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available.
AI Analysis
Technical Summary
CVE-2025-13275 identifies a security vulnerability in the Iqbolshoh php-business-website product, specifically affecting the /admin/about.php file. The flaw allows an attacker with authenticated high privileges to upload files without restriction or validation, which can lead to arbitrary file uploads. Such unrestricted upload vulnerabilities are critical because they can enable attackers to upload malicious scripts or web shells, potentially leading to remote code execution, data breaches, or full system compromise. The vulnerability is remotely exploitable and does not require user interaction, but it does require the attacker to have high-level privileges, likely administrative access to the web application. The product uses a rolling release model, complicating patch management and version tracking, and no official patches or version updates have been disclosed yet. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:H - high privileges required), no user interaction (UI:N), and low impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The exploit has been publicly disclosed, increasing the risk of exploitation despite no current known exploits in the wild. This vulnerability primarily affects organizations that deploy the Iqbolshoh php-business-website platform, particularly those exposing administrative interfaces to the internet or internal networks accessible by multiple users. The vulnerability's presence in an administrative PHP script suggests that attackers could leverage it to upload web shells or malware, leading to further lateral movement or data exfiltration.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for small and medium enterprises using the Iqbolshoh php-business-website platform for their online presence. Successful exploitation could lead to unauthorized code execution, data theft, defacement of websites, or pivoting into internal networks. Given the requirement for high privileges, the threat is more relevant in environments where administrative access controls are weak or compromised. The rolling release nature of the product may delay patch deployment, increasing exposure time. Organizations in sectors such as retail, professional services, and local government that rely on PHP-based business websites may face reputational damage, regulatory penalties under GDPR if personal data is compromised, and operational disruptions. The vulnerability could also be leveraged as a foothold for more sophisticated attacks targeting European supply chains or critical infrastructure if the affected systems are part of larger networks.
Mitigation Recommendations
1. Restrict administrative access to the /admin/about.php endpoint using network segmentation, VPNs, or IP whitelisting to reduce exposure. 2. Implement strict file upload validation, including checking file types, sizes, and content signatures to prevent malicious files. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious upload attempts. 4. Monitor logs and alerts for unusual upload activity or access patterns to the admin interface. 5. Enforce strong authentication and authorization controls to ensure only trusted users have high privileges. 6. Regularly audit and review user privileges to minimize the number of users with administrative rights. 7. Engage with the vendor or community to track updates or patches despite the rolling release model. 8. Consider isolating the web application environment using containerization or sandboxing to limit impact if exploited. 9. Conduct penetration testing focused on file upload functionalities to identify and remediate weaknesses proactively.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-13275: Unrestricted Upload in Iqbolshoh php-business-website
Description
A security vulnerability has been detected in Iqbolshoh php-business-website up to 10677743a8dfc281f85291a27cf63a0bce043c24. This affects an unknown part of the file /admin/about.php. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available.
AI-Powered Analysis
Technical Analysis
CVE-2025-13275 identifies a security vulnerability in the Iqbolshoh php-business-website product, specifically affecting the /admin/about.php file. The flaw allows an attacker with authenticated high privileges to upload files without restriction or validation, which can lead to arbitrary file uploads. Such unrestricted upload vulnerabilities are critical because they can enable attackers to upload malicious scripts or web shells, potentially leading to remote code execution, data breaches, or full system compromise. The vulnerability is remotely exploitable and does not require user interaction, but it does require the attacker to have high-level privileges, likely administrative access to the web application. The product uses a rolling release model, complicating patch management and version tracking, and no official patches or version updates have been disclosed yet. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:H - high privileges required), no user interaction (UI:N), and low impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The exploit has been publicly disclosed, increasing the risk of exploitation despite no current known exploits in the wild. This vulnerability primarily affects organizations that deploy the Iqbolshoh php-business-website platform, particularly those exposing administrative interfaces to the internet or internal networks accessible by multiple users. The vulnerability's presence in an administrative PHP script suggests that attackers could leverage it to upload web shells or malware, leading to further lateral movement or data exfiltration.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for small and medium enterprises using the Iqbolshoh php-business-website platform for their online presence. Successful exploitation could lead to unauthorized code execution, data theft, defacement of websites, or pivoting into internal networks. Given the requirement for high privileges, the threat is more relevant in environments where administrative access controls are weak or compromised. The rolling release nature of the product may delay patch deployment, increasing exposure time. Organizations in sectors such as retail, professional services, and local government that rely on PHP-based business websites may face reputational damage, regulatory penalties under GDPR if personal data is compromised, and operational disruptions. The vulnerability could also be leveraged as a foothold for more sophisticated attacks targeting European supply chains or critical infrastructure if the affected systems are part of larger networks.
Mitigation Recommendations
1. Restrict administrative access to the /admin/about.php endpoint using network segmentation, VPNs, or IP whitelisting to reduce exposure. 2. Implement strict file upload validation, including checking file types, sizes, and content signatures to prevent malicious files. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious upload attempts. 4. Monitor logs and alerts for unusual upload activity or access patterns to the admin interface. 5. Enforce strong authentication and authorization controls to ensure only trusted users have high privileges. 6. Regularly audit and review user privileges to minimize the number of users with administrative rights. 7. Engage with the vendor or community to track updates or patches despite the rolling release model. 8. Consider isolating the web application environment using containerization or sandboxing to limit impact if exploited. 9. Conduct penetration testing focused on file upload functionalities to identify and remediate weaknesses proactively.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-16T17:34:21.554Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691afbcd631894e18a64dcd9
Added to database: 11/17/2025, 10:41:17 AM
Last enriched: 11/24/2025, 11:16:05 AM
Last updated: 1/7/2026, 8:57:27 AM
Views: 78
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.