Skip to main content

CVE-2025-24775: CWE-434 Unrestricted Upload of File with Dangerous Type in Made I.T. Forms

Critical
VulnerabilityCVE-2025-24775cvecve-2025-24775cwe-434
Published: Thu Aug 14 2025 (08/14/2025, 10:34:36 UTC)
Source: CVE Database V5
Vendor/Project: Made I.T.
Product: Forms

Description

Unrestricted Upload of File with Dangerous Type vulnerability in Made I.T. Forms allows Upload a Web Shell to a Web Server. This issue affects Forms: from n/a through 2.9.0.

AI-Powered Analysis

AILast updated: 08/14/2025, 12:32:59 UTC

Technical Analysis

CVE-2025-24775 is a critical vulnerability classified under CWE-434, which pertains to the Unrestricted Upload of File with Dangerous Type in the Made I.T. Forms product. This vulnerability allows an attacker with at least low-level privileges (PR:L) to upload malicious files, such as web shells, to the web server hosting the vulnerable Forms application (versions up to 2.9.0). The vulnerability does not require user interaction (UI:N) and can be exploited remotely over the network (AV:N) with low attack complexity (AC:L). The vulnerability has a scope change (S:C), meaning the attack can affect resources beyond the initially compromised component. Successful exploitation results in complete compromise of confidentiality, integrity, and availability (C:H/I:H/A:H) of the affected system. By uploading a web shell, attackers can execute arbitrary commands on the server, potentially leading to full system takeover, data exfiltration, lateral movement within the network, and disruption of services. The vulnerability is currently published but no known exploits in the wild have been reported yet. However, given the severity and ease of exploitation, it is likely to become a target for attackers soon. The lack of patch links suggests that a fix may not yet be available, increasing the urgency for mitigation and monitoring.

Potential Impact

For European organizations using Made I.T. Forms, this vulnerability poses a severe risk. The ability to upload web shells can lead to unauthorized access to sensitive data, including personal data protected under GDPR, intellectual property, and internal communications. Compromise of web servers can also facilitate ransomware deployment or use as a pivot point for attacks on internal networks. The critical nature of the vulnerability means that attackers can fully control affected systems, leading to potential operational disruptions, financial losses, reputational damage, and regulatory penalties. Organizations in sectors such as finance, healthcare, government, and critical infrastructure are particularly at risk due to the sensitivity of their data and the potential impact of service outages. Additionally, the vulnerability's remote exploitability without user interaction makes it a high-priority threat for incident response teams.

Mitigation Recommendations

1. Immediate mitigation should include disabling file upload functionality in Made I.T. Forms until a patch is available. 2. Implement strict file type validation and filtering on the server side to block dangerous file extensions and MIME types, especially those capable of executing code (e.g., .php, .asp, .jsp). 3. Employ web application firewalls (WAFs) with custom rules to detect and block attempts to upload or execute web shells. 4. Restrict permissions on upload directories to prevent execution of uploaded files; configure the web server to treat upload directories as non-executable. 5. Monitor logs for unusual file upload activity and access patterns indicative of exploitation attempts. 6. Conduct regular vulnerability scanning and penetration testing focused on file upload functionalities. 7. Prepare incident response plans specifically addressing web shell detection and removal. 8. Engage with the vendor for timely patch releases and apply updates as soon as they become available. 9. Consider network segmentation to limit the impact of a compromised web server on internal systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-01-23T14:53:25.027Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689dbee0ad5a09ad0059e559

Added to database: 8/14/2025, 10:48:00 AM

Last enriched: 8/14/2025, 12:32:59 PM

Last updated: 9/4/2025, 10:23:07 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats