Skip to main content

CVE-2025-34046: CWE-434 Unrestricted Upload of File with Dangerous Type in Shanghai Fanwei Network Technology E-Office

Critical
VulnerabilityCVE-2025-34046cvecve-2025-34046cwe-434cwe-94
Published: Thu Jun 26 2025 (06/26/2025, 15:51:45 UTC)
Source: CVE Database V5
Vendor/Project: Shanghai Fanwei Network Technology
Product: E-Office

Description

An unauthenticated file upload vulnerability exists in the Fanwei E-Office <= v9.4 web management interface. The vulnerability affects the /general/index/UploadFile.php endpoint, which improperly validates uploaded files when invoked with certain parameters (uploadType=eoffice_logo or uploadType=theme). An attacker can exploit this flaw by sending a crafted HTTP POST request to upload arbitrary files without requiring authentication. Successful exploitation could enable remote code execution on the affected server, leading to complete compromise of the web application and potentially the underlying system.

AI-Powered Analysis

AILast updated: 06/26/2025, 16:20:28 UTC

Technical Analysis

CVE-2025-34046 is a critical unauthenticated file upload vulnerability affecting Shanghai Fanwei Network Technology's E-Office product, specifically versions up to and including v9.4. The vulnerability resides in the web management interface at the /general/index/UploadFile.php endpoint. This endpoint improperly validates files uploaded when the 'uploadType' parameter is set to 'eoffice_logo' or 'theme'. Due to insufficient validation, an attacker can craft a malicious HTTP POST request to upload arbitrary files, including potentially executable scripts, without any authentication or user interaction. This flaw enables remote code execution (RCE) on the affected server, allowing an attacker to execute arbitrary commands, gain full control over the web application, and potentially compromise the underlying operating system. The vulnerability is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) and CWE-94 (Improper Control of Generation of Code), indicating that the core issue is the lack of proper file type validation combined with the ability to execute uploaded code. The CVSS v4.0 base score is 10.0, reflecting the highest severity due to network attack vector, no required privileges or user interaction, and a wide scope affecting confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the critical nature and ease of exploitation make this a high-risk vulnerability for any organization using the affected E-Office versions.

Potential Impact

For European organizations using Shanghai Fanwei Network Technology's E-Office software, this vulnerability poses a severe risk. Successful exploitation could lead to complete system compromise, including unauthorized data access, data manipulation, or destruction, and disruption of business operations. Given that E-Office is a web management tool likely used for internal communications, document management, and workflow automation, attackers could gain access to sensitive corporate information, intellectual property, and personal data protected under GDPR. The breach could result in significant financial losses, reputational damage, and regulatory penalties. Additionally, compromised systems could be leveraged as pivot points for lateral movement within corporate networks or as launchpads for further attacks. The unauthenticated nature of the vulnerability means attackers do not need valid credentials, increasing the likelihood of exploitation. The lack of current known exploits provides a window for proactive mitigation, but the critical severity demands immediate attention.

Mitigation Recommendations

1. Immediate patching: Organizations should monitor Shanghai Fanwei Network Technology's official channels for security patches addressing CVE-2025-34046 and apply them promptly once available. 2. Temporary access restrictions: Until patches are applied, restrict access to the /general/index/UploadFile.php endpoint via network controls such as web application firewalls (WAFs), IP whitelisting, or VPN-only access to limit exposure. 3. Input validation enhancements: Implement additional server-side validation to restrict allowed file types strictly to safe formats (e.g., images only) and verify file content signatures rather than relying solely on extensions or MIME types. 4. Disable or limit upload functionality: If feasible, disable the vulnerable upload features (eoffice_logo and theme uploads) temporarily to prevent exploitation. 5. Monitor logs and network traffic: Establish enhanced monitoring for suspicious POST requests to the vulnerable endpoint and anomalous file uploads. 6. Conduct internal audits: Review deployed E-Office instances for exposure and verify that no unauthorized files have been uploaded. 7. Harden server environment: Employ least privilege principles for web server processes, disable unnecessary execution permissions in upload directories, and use application sandboxing to limit impact if exploitation occurs. 8. Incident response readiness: Prepare to respond rapidly to any detected exploitation attempts, including isolating affected systems and conducting forensic analysis.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.547Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 685d6fabca1063fb8742bc09

Added to database: 6/26/2025, 4:04:59 PM

Last enriched: 6/26/2025, 4:20:28 PM

Last updated: 8/15/2025, 5:40:41 AM

Views: 65

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats