Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15009: Unrestricted Upload in liweiyi ChestnutCMS

0
Medium
VulnerabilityCVE-2025-15009cvecve-2025-15009
Published: Mon Dec 22 2025 (12/22/2025, 02:32:05 UTC)
Source: CVE Database V5
Vendor/Project: liweiyi
Product: ChestnutCMS

Description

A flaw has been found in liweiyi ChestnutCMS up to 1.5.8. This vulnerability affects the function FilenameUtils.getExtension of the file /dev-api/common/upload of the component Filename Handler. Executing manipulation of the argument File can lead to unrestricted upload. The attack may be launched remotely. The exploit has been published and may be used.

AI-Powered Analysis

AILast updated: 12/22/2025, 03:03:52 UTC

Technical Analysis

CVE-2025-15009 is a vulnerability identified in liweiyi ChestnutCMS versions 1.5.0 through 1.5.8, specifically affecting the FilenameUtils.getExtension function used in the /dev-api/common/upload component. The flaw arises from improper handling and validation of the 'File' argument during upload operations, allowing attackers to bypass restrictions and perform unrestricted file uploads. This can lead to the placement of arbitrary files on the server, potentially enabling remote code execution, defacement, or further compromise depending on the server configuration and uploaded payload. The vulnerability is remotely exploitable without user interaction but requires low privileges, indicating that an attacker must have some level of access or be able to send crafted requests directly to the vulnerable endpoint. The CVSS 4.0 base score is 5.3, reflecting a medium severity with network attack vector, low complexity, no user interaction, and limited impact on confidentiality, integrity, and availability. Although no known exploits are currently active in the wild, proof-of-concept exploits have been published, increasing the risk of future attacks. The vulnerability stems from insufficient sanitization and validation of file extensions, which is critical in preventing malicious uploads. The lack of patch links suggests that official fixes may not yet be available, emphasizing the need for immediate mitigation steps by administrators.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to web servers running vulnerable versions of ChestnutCMS. Successful exploitation could allow attackers to upload malicious scripts or executables, potentially leading to unauthorized access, data leakage, defacement, or disruption of services. Organizations handling sensitive data or providing critical services via ChestnutCMS are at risk of confidentiality breaches and integrity violations. The medium severity score indicates that while the impact is not catastrophic, it can still cause significant operational and reputational damage. Given the remote exploitability and lack of user interaction, attackers can automate attacks at scale, increasing exposure. The absence of known active exploits currently reduces immediate risk but the published proof-of-concept code lowers the barrier for attackers. European entities with web infrastructure using ChestnutCMS, especially those in sectors like government, finance, and healthcare, should consider this vulnerability a priority for remediation to avoid potential exploitation.

Mitigation Recommendations

1. Immediately audit all instances of ChestnutCMS to identify affected versions (1.5.0 through 1.5.8). 2. If official patches become available, apply them without delay. 3. In the absence of patches, implement strict server-side validation to restrict file uploads by enforcing allowed file types and extensions explicitly. 4. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious upload attempts targeting the /dev-api/common/upload endpoint. 5. Restrict access to the upload API endpoint to authenticated and authorized users only, minimizing exposure. 6. Monitor logs for unusual upload activity or attempts to upload executable or script files. 7. Consider disabling or limiting file upload functionality if not essential. 8. Conduct regular security assessments and penetration testing focused on file upload mechanisms. 9. Educate development teams on secure coding practices related to file handling and input validation. 10. Maintain up-to-date backups and incident response plans to quickly recover from potential compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-21T12:51:06.591Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6948b19135589e6cb165ba56

Added to database: 12/22/2025, 2:48:49 AM

Last enriched: 12/22/2025, 3:03:52 AM

Last updated: 12/22/2025, 4:02:16 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats