Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34046: CWE-434 Unrestricted Upload of File with Dangerous Type in Shanghai Fanwei Network Technology E-Office

0
Critical
VulnerabilityCVE-2025-34046cvecve-2025-34046cwe-434
Published: Thu Jun 26 2025 (06/26/2025, 15:51:45 UTC)
Source: CVE Database V5
Vendor/Project: Shanghai Fanwei Network Technology
Product: E-Office

Description

An unauthenticated file upload vulnerability exists in the Fanwei E-Office <= v9.4 web management interface. The vulnerability affects the /general/index/UploadFile.php endpoint, which improperly validates uploaded files when invoked with certain parameters (uploadType=eoffice_logo or uploadType=theme). An attacker can exploit this flaw by sending a crafted HTTP POST request to upload arbitrary files without requiring authentication. Successful exploitation could enable remote code execution on the affected server, leading to complete compromise of the web application and potentially the underlying system. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-05 UTC.

AI-Powered Analysis

AILast updated: 11/24/2025, 22:57:49 UTC

Technical Analysis

CVE-2025-34046 is a critical vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting Shanghai Fanwei Network Technology's E-Office product, specifically versions up to and including 9.4. The vulnerability resides in the web management interface's /general/index/UploadFile.php endpoint, which handles file uploads. When invoked with specific parameters such as uploadType=eoffice_logo or uploadType=theme, the endpoint fails to properly validate the file type and content, allowing an attacker to upload arbitrary files without any authentication or user interaction. This flaw enables attackers to upload malicious scripts or executables that can be executed remotely, leading to remote code execution (RCE). Successful exploitation compromises the confidentiality, integrity, and availability of the affected system, potentially allowing full control over the web application and underlying server. The vulnerability was publicly disclosed in June 2025 with a CVSS 4.0 score of 10.0, reflecting its critical nature and ease of exploitation. Although no confirmed public exploits are currently available, Shadowserver Foundation observed exploitation attempts in February 2025, indicating active interest by threat actors. The vulnerability affects all deployments of E-Office up to version 9.4, which is used primarily in enterprise and government environments for internal office automation and management. The lack of authentication requirement and the ability to upload dangerous file types make this vulnerability highly exploitable and dangerous.

Potential Impact

For European organizations, the impact of CVE-2025-34046 is severe. Organizations using the affected E-Office versions risk complete system compromise through remote code execution, which can lead to data breaches, unauthorized access to sensitive information, disruption of business operations, and potential lateral movement within internal networks. Given that E-Office is often deployed in government agencies, educational institutions, and enterprises for internal management, exploitation could result in exposure of confidential documents, manipulation of administrative workflows, and disruption of critical services. The vulnerability's unauthenticated nature means attackers can exploit it remotely without prior access, increasing the attack surface significantly. Additionally, the ability to upload arbitrary files can facilitate the deployment of web shells or malware, enabling persistent access and further attacks. This poses a direct threat to the confidentiality, integrity, and availability of affected systems, potentially impacting compliance with European data protection regulations such as GDPR. The critical severity and evidence of exploitation attempts highlight the urgent need for mitigation to prevent potentially widespread impact across European organizations using this software.

Mitigation Recommendations

1. Immediate application of vendor-supplied patches or updates once released is the most effective mitigation. Monitor Shanghai Fanwei Network Technology's official channels for patch announcements. 2. Until patches are available, restrict access to the /general/index/UploadFile.php endpoint by implementing network-level controls such as IP whitelisting or VPN-only access to limit exposure. 3. Implement strict server-side validation of uploaded files, including verifying file types, extensions, and content signatures, to prevent dangerous file uploads. 4. Employ web application firewalls (WAFs) with rules designed to detect and block suspicious file upload attempts targeting the vulnerable parameters (uploadType=eoffice_logo or uploadType=theme). 5. Conduct thorough logging and monitoring of file upload activities and web server logs to detect anomalous or unauthorized upload attempts promptly. 6. Perform regular security assessments and penetration testing focused on file upload functionalities. 7. Educate IT and security teams about this vulnerability and ensure incident response plans include scenarios involving file upload exploitation. 8. Consider isolating the E-Office application environment to limit potential lateral movement in case of compromise. 9. Review and harden server and application configurations to minimize attack surface and privilege levels. 10. Backup critical data regularly and ensure recovery procedures are tested to mitigate impact of potential ransomware or destructive attacks following exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.547Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 685d6fabca1063fb8742bc09

Added to database: 6/26/2025, 4:04:59 PM

Last enriched: 11/24/2025, 10:57:49 PM

Last updated: 1/7/2026, 4:53:56 AM

Views: 314

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats