Skip to main content

CVE-2025-34040: CWE-434 Unrestricted Upload of File with Dangerous Type in Beijing Zhiyuan Internet Software Co., Ltd. OA

Critical
VulnerabilityCVE-2025-34040cvecve-2025-34040cwe-434cwe-22
Published: Tue Jun 24 2025 (06/24/2025, 01:12:22 UTC)
Source: CVE Database V5
Vendor/Project: Beijing Zhiyuan Internet Software Co., Ltd.
Product: OA

Description

An arbitrary file upload vulnerability exists in the Zhiyuan OA platform 5.0, 5.1 - 5.6sp1, 6.0 - 6.1sp2, 7.0, 7.0sp1 - 7.1, 7.1sp1, and 8.0 - 8.0sp2 via the wpsAssistServlet interface. The realFileType and fileId parameters are improperly validated during multipart file uploads, allowing unauthenticated attackers to upload crafted JSP files outside of intended directories using path traversal. Successful exploitation enables remote code execution as the uploaded file can be accessed and executed through the web server.

AI-Powered Analysis

AILast updated: 06/24/2025, 02:10:19 UTC

Technical Analysis

CVE-2025-34040 is a critical arbitrary file upload vulnerability affecting multiple versions of the Zhiyuan OA platform developed by Beijing Zhiyuan Internet Software Co., Ltd. The affected versions include 5.0, 5.1 through 5.6sp1, 6.0 through 6.1sp2, 7.0 through 7.1sp1, and 8.0 through 8.0sp2. The vulnerability resides in the wpsAssistServlet interface, which handles multipart file uploads. Specifically, the parameters 'realFileType' and 'fileId' are not properly validated, allowing an unauthenticated attacker to upload crafted JSP files. Due to insufficient validation and the presence of path traversal weaknesses (CWE-22), attackers can place these malicious files outside the intended directories. Once uploaded, these JSP files can be accessed and executed by the web server, enabling remote code execution (RCE) with the privileges of the web server process. This vulnerability does not require authentication or user interaction, making it highly exploitable remotely over the network. The CVSS 4.0 base score is 10.0, reflecting the highest severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (all rated high). No public exploits are currently known in the wild, but the ease of exploitation and critical impact make this a significant threat. The vulnerability combines CWE-434 (Unrestricted Upload of File with Dangerous Type) and CWE-22 (Path Traversal), indicating that the root cause is insufficient input validation and directory traversal protections during file upload processing.

Potential Impact

For European organizations using the Zhiyuan OA platform, this vulnerability poses a severe risk. Successful exploitation allows attackers to execute arbitrary code remotely, potentially leading to full system compromise, data theft, disruption of business operations, and lateral movement within the network. Given that the OA platform is typically used for internal office automation, including document management, workflow, and communication, attackers could gain access to sensitive corporate information and internal systems. The lack of authentication requirement means attackers can exploit this vulnerability from outside the network perimeter, increasing the risk of widespread attacks. The impact extends to confidentiality (exposure of sensitive data), integrity (modification or deletion of data), and availability (service disruption or denial). Additionally, compromised systems could be used as a foothold for further attacks, including ransomware deployment or espionage. The absence of known exploits in the wild currently provides a window for mitigation, but the critical nature of the flaw demands immediate attention to prevent potential exploitation.

Mitigation Recommendations

1. Immediate patching: Organizations should urgently apply any available patches or updates from Beijing Zhiyuan Internet Software Co., Ltd. If no official patches are available, consider temporary mitigations such as disabling the wpsAssistServlet interface or restricting access to it via network controls (e.g., firewall rules limiting access to trusted IPs). 2. Input validation hardening: Implement strict server-side validation on file upload parameters, especially 'realFileType' and 'fileId', to reject unexpected or malicious input. 3. Directory traversal protection: Enforce canonicalization and sanitization of file paths to prevent path traversal attacks, ensuring uploaded files cannot be placed outside designated directories. 4. File type restrictions: Restrict allowed upload file types to safe formats and block executable file types such as JSP, or implement content inspection to detect and block malicious payloads. 5. Web server configuration: Configure the web server to prevent execution of uploaded files in upload directories, for example by disabling script execution in these folders. 6. Monitoring and detection: Deploy file integrity monitoring and web application firewalls (WAFs) with rules targeting suspicious file uploads and path traversal attempts. 7. Network segmentation: Isolate the OA platform servers from critical infrastructure to limit potential lateral movement if compromised. 8. Incident response readiness: Prepare to respond quickly to any signs of exploitation, including forensic analysis and system restoration from clean backups. These measures combined will reduce the risk of exploitation and limit the impact if an attack occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.546Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 685a0560dec26fc862d8cf71

Added to database: 6/24/2025, 1:54:40 AM

Last enriched: 6/24/2025, 2:10:19 AM

Last updated: 8/12/2025, 7:51:40 AM

Views: 24

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats