CVE-2025-34040: CWE-434 Unrestricted Upload of File with Dangerous Type in Beijing Zhiyuan Internet Software Co., Ltd. OA
An arbitrary file upload vulnerability exists in the Zhiyuan OA platform 5.0, 5.1 - 5.6sp1, 6.0 - 6.1sp2, 7.0, 7.0sp1 - 7.1, 7.1sp1, and 8.0 - 8.0sp2 via the wpsAssistServlet interface. The realFileType and fileId parameters are improperly validated during multipart file uploads, allowing unauthenticated attackers to upload crafted JSP files outside of intended directories using path traversal. Successful exploitation enables remote code execution as the uploaded file can be accessed and executed through the web server.
AI Analysis
Technical Summary
CVE-2025-34040 is a critical arbitrary file upload vulnerability affecting multiple versions of the Zhiyuan OA platform developed by Beijing Zhiyuan Internet Software Co., Ltd. The affected versions include 5.0, 5.1 through 5.6sp1, 6.0 through 6.1sp2, 7.0 through 7.1sp1, and 8.0 through 8.0sp2. The vulnerability resides in the wpsAssistServlet interface, which handles multipart file uploads. Specifically, the parameters 'realFileType' and 'fileId' are not properly validated, allowing an unauthenticated attacker to upload crafted JSP files. Due to insufficient validation and the presence of path traversal weaknesses (CWE-22), attackers can place these malicious files outside the intended directories. Once uploaded, these JSP files can be accessed and executed by the web server, enabling remote code execution (RCE) with the privileges of the web server process. This vulnerability does not require authentication or user interaction, making it highly exploitable remotely over the network. The CVSS 4.0 base score is 10.0, reflecting the highest severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (all rated high). No public exploits are currently known in the wild, but the ease of exploitation and critical impact make this a significant threat. The vulnerability combines CWE-434 (Unrestricted Upload of File with Dangerous Type) and CWE-22 (Path Traversal), indicating that the root cause is insufficient input validation and directory traversal protections during file upload processing.
Potential Impact
For European organizations using the Zhiyuan OA platform, this vulnerability poses a severe risk. Successful exploitation allows attackers to execute arbitrary code remotely, potentially leading to full system compromise, data theft, disruption of business operations, and lateral movement within the network. Given that the OA platform is typically used for internal office automation, including document management, workflow, and communication, attackers could gain access to sensitive corporate information and internal systems. The lack of authentication requirement means attackers can exploit this vulnerability from outside the network perimeter, increasing the risk of widespread attacks. The impact extends to confidentiality (exposure of sensitive data), integrity (modification or deletion of data), and availability (service disruption or denial). Additionally, compromised systems could be used as a foothold for further attacks, including ransomware deployment or espionage. The absence of known exploits in the wild currently provides a window for mitigation, but the critical nature of the flaw demands immediate attention to prevent potential exploitation.
Mitigation Recommendations
1. Immediate patching: Organizations should urgently apply any available patches or updates from Beijing Zhiyuan Internet Software Co., Ltd. If no official patches are available, consider temporary mitigations such as disabling the wpsAssistServlet interface or restricting access to it via network controls (e.g., firewall rules limiting access to trusted IPs). 2. Input validation hardening: Implement strict server-side validation on file upload parameters, especially 'realFileType' and 'fileId', to reject unexpected or malicious input. 3. Directory traversal protection: Enforce canonicalization and sanitization of file paths to prevent path traversal attacks, ensuring uploaded files cannot be placed outside designated directories. 4. File type restrictions: Restrict allowed upload file types to safe formats and block executable file types such as JSP, or implement content inspection to detect and block malicious payloads. 5. Web server configuration: Configure the web server to prevent execution of uploaded files in upload directories, for example by disabling script execution in these folders. 6. Monitoring and detection: Deploy file integrity monitoring and web application firewalls (WAFs) with rules targeting suspicious file uploads and path traversal attempts. 7. Network segmentation: Isolate the OA platform servers from critical infrastructure to limit potential lateral movement if compromised. 8. Incident response readiness: Prepare to respond quickly to any signs of exploitation, including forensic analysis and system restoration from clean backups. These measures combined will reduce the risk of exploitation and limit the impact if an attack occurs.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-34040: CWE-434 Unrestricted Upload of File with Dangerous Type in Beijing Zhiyuan Internet Software Co., Ltd. OA
Description
An arbitrary file upload vulnerability exists in the Zhiyuan OA platform 5.0, 5.1 - 5.6sp1, 6.0 - 6.1sp2, 7.0, 7.0sp1 - 7.1, 7.1sp1, and 8.0 - 8.0sp2 via the wpsAssistServlet interface. The realFileType and fileId parameters are improperly validated during multipart file uploads, allowing unauthenticated attackers to upload crafted JSP files outside of intended directories using path traversal. Successful exploitation enables remote code execution as the uploaded file can be accessed and executed through the web server.
AI-Powered Analysis
Technical Analysis
CVE-2025-34040 is a critical arbitrary file upload vulnerability affecting multiple versions of the Zhiyuan OA platform developed by Beijing Zhiyuan Internet Software Co., Ltd. The affected versions include 5.0, 5.1 through 5.6sp1, 6.0 through 6.1sp2, 7.0 through 7.1sp1, and 8.0 through 8.0sp2. The vulnerability resides in the wpsAssistServlet interface, which handles multipart file uploads. Specifically, the parameters 'realFileType' and 'fileId' are not properly validated, allowing an unauthenticated attacker to upload crafted JSP files. Due to insufficient validation and the presence of path traversal weaknesses (CWE-22), attackers can place these malicious files outside the intended directories. Once uploaded, these JSP files can be accessed and executed by the web server, enabling remote code execution (RCE) with the privileges of the web server process. This vulnerability does not require authentication or user interaction, making it highly exploitable remotely over the network. The CVSS 4.0 base score is 10.0, reflecting the highest severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (all rated high). No public exploits are currently known in the wild, but the ease of exploitation and critical impact make this a significant threat. The vulnerability combines CWE-434 (Unrestricted Upload of File with Dangerous Type) and CWE-22 (Path Traversal), indicating that the root cause is insufficient input validation and directory traversal protections during file upload processing.
Potential Impact
For European organizations using the Zhiyuan OA platform, this vulnerability poses a severe risk. Successful exploitation allows attackers to execute arbitrary code remotely, potentially leading to full system compromise, data theft, disruption of business operations, and lateral movement within the network. Given that the OA platform is typically used for internal office automation, including document management, workflow, and communication, attackers could gain access to sensitive corporate information and internal systems. The lack of authentication requirement means attackers can exploit this vulnerability from outside the network perimeter, increasing the risk of widespread attacks. The impact extends to confidentiality (exposure of sensitive data), integrity (modification or deletion of data), and availability (service disruption or denial). Additionally, compromised systems could be used as a foothold for further attacks, including ransomware deployment or espionage. The absence of known exploits in the wild currently provides a window for mitigation, but the critical nature of the flaw demands immediate attention to prevent potential exploitation.
Mitigation Recommendations
1. Immediate patching: Organizations should urgently apply any available patches or updates from Beijing Zhiyuan Internet Software Co., Ltd. If no official patches are available, consider temporary mitigations such as disabling the wpsAssistServlet interface or restricting access to it via network controls (e.g., firewall rules limiting access to trusted IPs). 2. Input validation hardening: Implement strict server-side validation on file upload parameters, especially 'realFileType' and 'fileId', to reject unexpected or malicious input. 3. Directory traversal protection: Enforce canonicalization and sanitization of file paths to prevent path traversal attacks, ensuring uploaded files cannot be placed outside designated directories. 4. File type restrictions: Restrict allowed upload file types to safe formats and block executable file types such as JSP, or implement content inspection to detect and block malicious payloads. 5. Web server configuration: Configure the web server to prevent execution of uploaded files in upload directories, for example by disabling script execution in these folders. 6. Monitoring and detection: Deploy file integrity monitoring and web application firewalls (WAFs) with rules targeting suspicious file uploads and path traversal attempts. 7. Network segmentation: Isolate the OA platform servers from critical infrastructure to limit potential lateral movement if compromised. 8. Incident response readiness: Prepare to respond quickly to any signs of exploitation, including forensic analysis and system restoration from clean backups. These measures combined will reduce the risk of exploitation and limit the impact if an attack occurs.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.546Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 685a0560dec26fc862d8cf71
Added to database: 6/24/2025, 1:54:40 AM
Last enriched: 6/24/2025, 2:10:19 AM
Last updated: 8/12/2025, 7:51:40 AM
Views: 24
Related Threats
CVE-2025-9007: Buffer Overflow in Tenda CH22
HighCVE-2025-9006: Buffer Overflow in Tenda CH22
HighCVE-2025-9005: Information Exposure Through Error Message in mtons mblog
MediumCVE-2025-9004: Improper Restriction of Excessive Authentication Attempts in mtons mblog
MediumCVE-2025-9003: Cross Site Scripting in D-Link DIR-818LW
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.