Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34040: CWE-434 Unrestricted Upload of File with Dangerous Type in Seeyon (Beijing Zhiyuan Internet Software Co., Ltd.) Zhiyuan OA Web Application System

0
Critical
VulnerabilityCVE-2025-34040cvecve-2025-34040cwe-434cwe-22
Published: Tue Jun 24 2025 (06/24/2025, 01:12:22 UTC)
Source: CVE Database V5
Vendor/Project: Seeyon (Beijing Zhiyuan Internet Software Co., Ltd.)
Product: Zhiyuan OA Web Application System

Description

An arbitrary file upload vulnerability exists in the Zhiyuan OA platform via the wpsAssistServlet interface. The realFileType and fileId parameters are improperly validated during multipart file uploads, allowing unauthenticated attackers to upload crafted JSP files outside of intended directories using path traversal. Successful exploitation enables remote code execution as the uploaded file can be accessed and executed through the web server. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-01 UTC.

AI-Powered Analysis

AILast updated: 11/17/2025, 22:09:17 UTC

Technical Analysis

CVE-2025-34040 is a critical security vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) and CWE-22 (Path Traversal) affecting the Zhiyuan OA Web Application System developed by Seeyon (Beijing Zhiyuan Internet Software Co., Ltd.). The vulnerability resides in the wpsAssistServlet interface, which handles multipart file uploads. Specifically, the parameters 'realFileType' and 'fileId' are not properly validated, allowing attackers to bypass intended file type restrictions and directory constraints. This improper validation enables unauthenticated attackers to upload crafted JSP files outside the designated upload directories by exploiting path traversal techniques. Once uploaded, these JSP files can be accessed and executed by the web server, resulting in remote code execution (RCE) with the privileges of the web application process. The vulnerability affects multiple versions of Zhiyuan OA, including 5.0, 5.1, 6.0, 7.0, 7.0sp1, 7.1sp1, and 8.0, indicating a broad attack surface. The CVSS 4.0 score is 10, reflecting the highest severity due to network attack vector, no required authentication or user interaction, and high impact on confidentiality, integrity, and availability. Exploitation evidence was confirmed by the Shadowserver Foundation on July 5, 2025, although no large-scale exploit campaigns have been reported yet. This vulnerability allows attackers to gain full control over affected systems, potentially leading to data theft, system manipulation, or lateral movement within networks. The root cause lies in insufficient input validation and inadequate file upload controls, which are common pitfalls in web application security. Given the critical nature and ease of exploitation, this vulnerability represents a severe threat to organizations using the Zhiyuan OA platform.

Potential Impact

For European organizations, the impact of CVE-2025-34040 is significant due to the potential for complete system compromise. Zhiyuan OA is an enterprise office automation platform widely used in various sectors including government, finance, and large enterprises, which often handle sensitive data. Successful exploitation can lead to unauthorized access to confidential information, disruption of business operations, and the deployment of further malware or ransomware. The ability to execute arbitrary code remotely without authentication increases the risk of rapid and widespread compromise. This can also facilitate espionage, data exfiltration, and sabotage, especially in critical infrastructure or regulated industries. The vulnerability's exploitation could undermine trust in affected organizations and lead to regulatory penalties under GDPR if personal data is exposed. Additionally, the path traversal aspect may allow attackers to overwrite or manipulate critical files, further exacerbating the damage. The lack of current widespread exploitation provides a window for proactive defense, but the critical severity demands immediate action to prevent potential attacks.

Mitigation Recommendations

1. Immediately restrict and sanitize all file upload inputs on the wpsAssistServlet interface, enforcing strict validation of file types and disallowing any path traversal sequences such as '../'. 2. Implement server-side checks to ensure uploaded files are stored only within designated directories and prevent execution of uploaded files unless explicitly required and secured. 3. Deploy web application firewalls (WAFs) with rules to detect and block suspicious multipart upload requests targeting the vulnerable parameters. 4. Monitor logs for unusual file upload activity, especially attempts to upload JSP or other executable files. 5. Apply vendor patches or updates as soon as they become available; if no official patch exists yet, consider temporary mitigations such as disabling the vulnerable upload functionality or restricting access to the servlet via network controls. 6. Conduct thorough security audits and penetration testing focused on file upload mechanisms to identify and remediate similar weaknesses. 7. Educate system administrators and developers on secure file handling practices and the risks of path traversal and unrestricted file uploads. 8. Use application sandboxing or containerization to limit the impact of potential code execution. 9. Regularly back up critical data and maintain incident response plans to quickly respond to any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.546Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 685a0560dec26fc862d8cf71

Added to database: 6/24/2025, 1:54:40 AM

Last enriched: 11/17/2025, 10:09:17 PM

Last updated: 11/22/2025, 7:35:03 PM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats