Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14199: Unrestricted Upload

0
Medium
VulnerabilityCVE-2025-14199cvecve-2025-14199
Published: Sun Dec 07 2025 (12/07/2025, 17:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Verysync

Description

A flaw has been found in Verysync 微力同步 up to 2.21.3. This impacts an unknown function of the file /rest/f/api/resources/f96956469e7be39d/tmp/text.txt?override=false of the component Web Administration Module. Executing manipulation can lead to unrestricted upload. The attack may be performed from remote. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/07/2025, 17:25:39 UTC

Technical Analysis

CVE-2025-14199 is a vulnerability identified in the Verysync software, specifically affecting versions 2.21.0 through 2.21.3. The flaw resides in the Web Administration Module, within an unspecified function related to the file path /rest/f/api/resources/f96956469e7be39d/tmp/text.txt?override=false. This vulnerability allows an attacker to perform an unrestricted file upload remotely. The attack vector requires network access and low-level privileges but does not require user interaction or elevated privileges. The unrestricted upload capability means an attacker can potentially upload malicious files, such as web shells or scripts, which could be executed to compromise the system further. The CVSS 4.0 vector indicates low complexity and no authentication required beyond limited privileges, with partial impact on confidentiality, integrity, and availability. The vendor was notified but has not responded, and no patches or mitigations have been officially released. Although no active exploitation in the wild has been reported, the public availability of exploit code increases the risk of attacks. The vulnerability's presence in a web administration component makes it particularly sensitive, as successful exploitation could lead to unauthorized administrative actions or persistent access.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to those deploying Verysync in their infrastructure. Successful exploitation could lead to unauthorized file uploads, enabling attackers to execute arbitrary code, escalate privileges, or disrupt services. This could compromise sensitive data confidentiality, integrity of systems, and availability of services. Organizations in sectors such as finance, government, healthcare, and critical infrastructure that rely on Verysync for file synchronization or administrative functions are particularly vulnerable. The lack of vendor response and patches increases exposure time. Additionally, the presence of publicly available exploit code lowers the barrier for attackers, potentially increasing targeted attacks against European entities. The impact is compounded in environments where network segmentation or access controls are weak, allowing attackers easier access to the vulnerable endpoint.

Mitigation Recommendations

European organizations should implement immediate compensating controls to reduce risk. These include restricting network access to the Web Administration Module endpoint to trusted administrators only, ideally via VPN or secure tunnels. Implement strict input validation and file type restrictions on uploads if configurable. Monitor logs and network traffic for unusual upload activity or access patterns to the vulnerable URL. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious upload attempts targeting the specific endpoint. Conduct internal audits to identify all Verysync instances and verify versions, prioritizing upgrades or replacements where possible. If upgrading is not immediately feasible due to lack of vendor patches, consider isolating affected systems or disabling the vulnerable module temporarily. Maintain heightened incident response readiness to detect and respond to potential exploitation attempts. Engage with the vendor or community for updates and patches, and consider alternative software solutions if the vendor remains unresponsive.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-06T17:34:34.823Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6935b5201ce29f22215bf218

Added to database: 12/7/2025, 5:10:56 PM

Last enriched: 12/7/2025, 5:25:39 PM

Last updated: 12/8/2025, 4:05:43 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats