Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34097: CWE-434 Unrestricted Upload of File with Dangerous Type in ProcessMaker Inc. ProcessMaker

0
High
VulnerabilityCVE-2025-34097cvecve-2025-34097cwe-434
Published: Thu Jul 10 2025 (07/10/2025, 19:12:37 UTC)
Source: CVE Database V5
Vendor/Project: ProcessMaker Inc.
Product: ProcessMaker

Description

An unrestricted file upload vulnerability exists in ProcessMaker versions prior to 3.5.4 due to improper handling of uploaded plugin archives. An attacker with administrative privileges can upload a malicious .tar plugin file containing arbitrary PHP code. Upon installation, the plugin’s install() method is invoked, resulting in execution of attacker-supplied PHP code on the server with the privileges of the web server user. This vulnerability can be chained with CVE-2022-38577 — a privilege escalation flaw in the user profile page — to achieve full remote code execution from a low-privileged account.

AI-Powered Analysis

AILast updated: 11/19/2025, 13:14:36 UTC

Technical Analysis

CVE-2025-34097 is an unrestricted file upload vulnerability categorized under CWE-434, affecting ProcessMaker versions before 3.5.4. The vulnerability arises from improper validation and handling of uploaded plugin archives, specifically .tar files. An attacker possessing administrative privileges can upload a malicious plugin archive containing arbitrary PHP code. Upon installation of this plugin, the install() method is automatically invoked, which executes the embedded PHP code with the privileges of the web server user. This execution context typically has significant access to the underlying system and application data. The vulnerability is particularly dangerous because it can be chained with CVE-2022-38577, a privilege escalation vulnerability in the user profile page, enabling an attacker starting from a low-privileged account to escalate privileges and achieve full remote code execution on the server. The CVSS 4.0 base score is 8.6, reflecting high severity due to network attack vector, low attack complexity, no required privileges beyond administrative, and no user interaction. The vulnerability does not require social engineering or user interaction, making it easier to exploit once administrative access is obtained. Although no public exploits are currently known, the potential impact includes full system compromise, data theft, service disruption, and lateral movement within the network. The vulnerability affects all versions prior to 3.5.4, and no official patches or mitigation links were provided at the time of publication, emphasizing the need for immediate vendor updates or workarounds.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to severe consequences including unauthorized access to sensitive business processes managed by ProcessMaker, data breaches involving personal and corporate data, and potential disruption of critical workflows. Given ProcessMaker's use in business process management and workflow automation, attackers gaining remote code execution could manipulate or halt essential operations, impacting service delivery and compliance with regulations such as GDPR. The ability to chain this vulnerability with a privilege escalation flaw increases the attack surface, allowing attackers to bypass access controls and gain persistent footholds. This could lead to lateral movement within corporate networks, further compromising other systems and data. The impact is particularly critical for sectors relying heavily on ProcessMaker for regulated or sensitive processes, such as finance, healthcare, and government agencies within Europe. Additionally, the compromise of web server privileges can facilitate deployment of ransomware or other malware, amplifying operational and financial damages.

Mitigation Recommendations

European organizations using ProcessMaker should immediately upgrade to version 3.5.4 or later once available to address this vulnerability. Until patches are applied, restrict administrative privileges strictly to trusted personnel and implement multi-factor authentication to reduce the risk of credential compromise. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious plugin upload attempts, especially those involving .tar archives. Conduct thorough audits of existing plugins and uploaded files to identify and remove any unauthorized or suspicious plugins. Monitor server logs for unusual installation activities or PHP execution patterns indicative of exploitation attempts. Network segmentation should be enforced to limit the exposure of ProcessMaker servers to only necessary internal systems. Additionally, implement strict input validation and file type restrictions at the application level where possible. Regularly review and update access controls and conduct security awareness training focused on privilege misuse. Finally, maintain up-to-date backups and incident response plans to quickly recover from potential compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.555Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687014fca83201eaaca979ce

Added to database: 7/10/2025, 7:31:08 PM

Last enriched: 11/19/2025, 1:14:36 PM

Last updated: 11/20/2025, 8:56:45 PM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats