CVE-2025-14199: Unrestricted Upload
A flaw has been found in Verysync 微力同步 up to 2.21.3. This impacts an unknown function of the file /rest/f/api/resources/f96956469e7be39d/tmp/text.txt?override=false of the component Web Administration Module. Executing manipulation can lead to unrestricted upload. The attack may be performed from remote. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-14199 is a vulnerability identified in the Verysync software, specifically affecting versions 2.21.0 through 2.21.3. The flaw resides in the Web Administration Module, within an unspecified function related to the file path /rest/f/api/resources/f96956469e7be39d/tmp/text.txt?override=false. This vulnerability allows an attacker to perform an unrestricted file upload remotely. The attack vector requires network access and low-level privileges but does not require user interaction or elevated privileges. The unrestricted upload capability means an attacker can potentially upload malicious files, such as web shells or scripts, which could be executed to compromise the system further. The CVSS 4.0 vector indicates low complexity and no authentication required beyond limited privileges, with partial impact on confidentiality, integrity, and availability. The vendor was notified but has not responded, and no patches or mitigations have been officially released. Although no active exploitation in the wild has been reported, the public availability of exploit code increases the risk of attacks. The vulnerability's presence in a web administration component makes it particularly sensitive, as successful exploitation could lead to unauthorized administrative actions or persistent access.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to those deploying Verysync in their infrastructure. Successful exploitation could lead to unauthorized file uploads, enabling attackers to execute arbitrary code, escalate privileges, or disrupt services. This could compromise sensitive data confidentiality, integrity of systems, and availability of services. Organizations in sectors such as finance, government, healthcare, and critical infrastructure that rely on Verysync for file synchronization or administrative functions are particularly vulnerable. The lack of vendor response and patches increases exposure time. Additionally, the presence of publicly available exploit code lowers the barrier for attackers, potentially increasing targeted attacks against European entities. The impact is compounded in environments where network segmentation or access controls are weak, allowing attackers easier access to the vulnerable endpoint.
Mitigation Recommendations
European organizations should implement immediate compensating controls to reduce risk. These include restricting network access to the Web Administration Module endpoint to trusted administrators only, ideally via VPN or secure tunnels. Implement strict input validation and file type restrictions on uploads if configurable. Monitor logs and network traffic for unusual upload activity or access patterns to the vulnerable URL. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious upload attempts targeting the specific endpoint. Conduct internal audits to identify all Verysync instances and verify versions, prioritizing upgrades or replacements where possible. If upgrading is not immediately feasible due to lack of vendor patches, consider isolating affected systems or disabling the vulnerable module temporarily. Maintain heightened incident response readiness to detect and respond to potential exploitation attempts. Engage with the vendor or community for updates and patches, and consider alternative software solutions if the vendor remains unresponsive.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-14199: Unrestricted Upload
Description
A flaw has been found in Verysync 微力同步 up to 2.21.3. This impacts an unknown function of the file /rest/f/api/resources/f96956469e7be39d/tmp/text.txt?override=false of the component Web Administration Module. Executing manipulation can lead to unrestricted upload. The attack may be performed from remote. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-14199 is a vulnerability identified in the Verysync software, specifically affecting versions 2.21.0 through 2.21.3. The flaw resides in the Web Administration Module, within an unspecified function related to the file path /rest/f/api/resources/f96956469e7be39d/tmp/text.txt?override=false. This vulnerability allows an attacker to perform an unrestricted file upload remotely. The attack vector requires network access and low-level privileges but does not require user interaction or elevated privileges. The unrestricted upload capability means an attacker can potentially upload malicious files, such as web shells or scripts, which could be executed to compromise the system further. The CVSS 4.0 vector indicates low complexity and no authentication required beyond limited privileges, with partial impact on confidentiality, integrity, and availability. The vendor was notified but has not responded, and no patches or mitigations have been officially released. Although no active exploitation in the wild has been reported, the public availability of exploit code increases the risk of attacks. The vulnerability's presence in a web administration component makes it particularly sensitive, as successful exploitation could lead to unauthorized administrative actions or persistent access.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to those deploying Verysync in their infrastructure. Successful exploitation could lead to unauthorized file uploads, enabling attackers to execute arbitrary code, escalate privileges, or disrupt services. This could compromise sensitive data confidentiality, integrity of systems, and availability of services. Organizations in sectors such as finance, government, healthcare, and critical infrastructure that rely on Verysync for file synchronization or administrative functions are particularly vulnerable. The lack of vendor response and patches increases exposure time. Additionally, the presence of publicly available exploit code lowers the barrier for attackers, potentially increasing targeted attacks against European entities. The impact is compounded in environments where network segmentation or access controls are weak, allowing attackers easier access to the vulnerable endpoint.
Mitigation Recommendations
European organizations should implement immediate compensating controls to reduce risk. These include restricting network access to the Web Administration Module endpoint to trusted administrators only, ideally via VPN or secure tunnels. Implement strict input validation and file type restrictions on uploads if configurable. Monitor logs and network traffic for unusual upload activity or access patterns to the vulnerable URL. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious upload attempts targeting the specific endpoint. Conduct internal audits to identify all Verysync instances and verify versions, prioritizing upgrades or replacements where possible. If upgrading is not immediately feasible due to lack of vendor patches, consider isolating affected systems or disabling the vulnerable module temporarily. Maintain heightened incident response readiness to detect and respond to potential exploitation attempts. Engage with the vendor or community for updates and patches, and consider alternative software solutions if the vendor remains unresponsive.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-06T17:34:34.823Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6935b5201ce29f22215bf218
Added to database: 12/7/2025, 5:10:56 PM
Last enriched: 12/7/2025, 5:25:39 PM
Last updated: 12/8/2025, 4:05:43 AM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14214: SQL Injection in itsourcecode Student Information System
MediumCVE-2025-14212: SQL Injection in projectworlds Advanced Library Management System
MediumCVE-2025-14211: SQL Injection in projectworlds Advanced Library Management System
MediumCVE-2025-14209: SQL Injection in Campcodes School File Management System
MediumCVE-2025-14208: Command Injection in D-Link DIR-823X
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.