Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14522: Unrestricted Upload in baowzh hfly

0
Medium
VulnerabilityCVE-2025-14522cvecve-2025-14522
Published: Thu Dec 11 2025 (12/11/2025, 16:02:17 UTC)
Source: CVE Database V5
Vendor/Project: baowzh
Product: hfly

Description

A vulnerability was detected in baowzh hfly up to 638ff9abe9078bc977c132b37acbe1900b63491c. The impacted element is an unknown function of the file /Public/Kindeditor/php/upload_json.php. Performing manipulation of the argument imgFile results in unrestricted upload. It is possible to initiate the attack remotely. The exploit is now public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/11/2025, 16:38:51 UTC

Technical Analysis

CVE-2025-14522 is a vulnerability identified in the baowzh hfly software, specifically affecting the file upload functionality implemented in /Public/Kindeditor/php/upload_json.php. The flaw arises from insufficient validation or restrictions on the imgFile parameter, which allows an attacker to upload arbitrary files, including potentially malicious scripts. This unrestricted upload can lead to remote code execution or unauthorized system access. The vulnerability is exploitable remotely without requiring authentication or user interaction, making it relatively easy to exploit. The product uses a rolling release model, complicating version tracking and patch management, and the vendor has not responded to disclosure efforts, leaving the vulnerability unpatched. The CVSS 4.0 score of 5.3 reflects a medium severity, considering the network attack vector, lack of authentication, and low complexity, but limited impact on confidentiality, integrity, and availability. Although no active exploitation has been reported, the public availability of exploit code increases the risk of future attacks. Organizations running baowzh hfly should be aware of this vulnerability and take immediate steps to mitigate potential exploitation.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to unauthorized file uploads, enabling attackers to execute arbitrary code, implant backdoors, or manipulate data. This can compromise the confidentiality, integrity, and availability of affected systems, potentially leading to data breaches, service disruptions, or lateral movement within networks. Given the remote and unauthenticated nature of the exploit, attackers could target exposed instances at scale. Sectors relying on baowzh hfly for web content management or internal applications may face operational risks and reputational damage. The lack of vendor response and patches increases exposure duration, heightening the risk. Additionally, compliance with European data protection regulations (e.g., GDPR) could be jeopardized if personal data is compromised through exploitation. Organizations with internet-facing deployments of baowzh hfly are particularly vulnerable.

Mitigation Recommendations

1. Immediately audit all instances of baowzh hfly to identify exposure of the /Public/Kindeditor/php/upload_json.php endpoint. 2. Implement strict access controls and network segmentation to limit exposure of vulnerable endpoints to trusted internal networks only. 3. Deploy web application firewalls (WAFs) with custom rules to detect and block suspicious file upload attempts targeting the imgFile parameter. 4. Conduct manual or automated code reviews to add server-side validation restricting file types, sizes, and content for uploads. 5. Disable or restrict file upload functionality if not essential. 6. Monitor logs for unusual upload activity or webshell deployment indicators. 7. If possible, replace or isolate the affected component until a vendor patch or update is available. 8. Engage in threat hunting to detect any signs of compromise related to this vulnerability. 9. Maintain up-to-date backups and incident response plans to quickly recover from potential exploitation. 10. Advocate for vendor engagement and monitor for any forthcoming patches or advisories.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-11T07:00:46.142Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693af01c7d4c6f31f7b8523c

Added to database: 12/11/2025, 4:23:56 PM

Last enriched: 12/11/2025, 4:38:51 PM

Last updated: 12/11/2025, 11:38:58 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats