Skip to main content

CVE-2025-34100: CWE-434 Unrestricted Upload of File with Dangerous Type in BuilderEngine CMS

Critical
VulnerabilityCVE-2025-34100cvecve-2025-34100cwe-434cwe-20cwe-306
Published: Thu Jul 10 2025 (07/10/2025, 19:16:28 UTC)
Source: CVE Database V5
Vendor/Project: BuilderEngine
Product: CMS

Description

An unrestricted file upload vulnerability exists in BuilderEngine 3.5.0 via the integration of the elFinder 2.0 file manager and its use of the jQuery File Upload plugin. The plugin fails to properly validate or restrict file types or locations during upload operations, allowing an attacker to upload a malicious .php file and subsequently execute arbitrary PHP code on the server under the context of the web server process. While the root vulnerability lies within the jQuery File Upload component, BuilderEngine’s improper integration and lack of access controls expose this functionality to unauthenticated users, resulting in full remote code execution.

AI-Powered Analysis

AILast updated: 07/17/2025, 21:13:44 UTC

Technical Analysis

CVE-2025-34100 is a critical security vulnerability identified in BuilderEngine CMS version 3.5.0. The root cause stems from the integration of the elFinder 2.0 file manager, which utilizes the jQuery File Upload plugin. This plugin fails to adequately validate or restrict file types and upload locations, permitting attackers to upload malicious files, specifically .php scripts. Due to BuilderEngine's improper integration and lack of access control mechanisms, this file upload functionality is exposed to unauthenticated users. Consequently, an attacker can upload a crafted PHP file and execute arbitrary code on the server with the privileges of the web server process. This results in full remote code execution (RCE) without requiring authentication or user interaction. The vulnerability is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type), CWE-20 (Improper Input Validation), and CWE-306 (Missing Authentication for Critical Function). The CVSS 4.0 base score is 9.3 (critical), reflecting the ease of exploitation (network attack vector, no privileges or user interaction required) and the high impact on confidentiality, integrity, and availability. Although the underlying issue originates from the jQuery File Upload component, BuilderEngine's failure to implement proper access controls and input validation significantly amplifies the risk. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date (July 10, 2025).

Potential Impact

For European organizations using BuilderEngine CMS 3.5.0, this vulnerability poses a severe risk. Successful exploitation allows attackers to execute arbitrary PHP code remotely, potentially leading to full system compromise. This can result in data breaches, defacement, deployment of ransomware, or use of the compromised server as a pivot point for lateral movement within internal networks. Confidentiality is at high risk due to unauthorized data access; integrity is compromised through unauthorized code execution and potential data manipulation; availability can be disrupted by denial-of-service conditions or destructive payloads. Given the unauthenticated nature of the exploit, attackers can scan for vulnerable BuilderEngine instances and compromise them en masse. This is particularly concerning for European organizations handling sensitive personal data under GDPR, as breaches could lead to regulatory penalties and reputational damage. Additionally, the lack of user interaction and authentication requirements makes automated exploitation feasible, increasing the threat surface.

Mitigation Recommendations

European organizations should immediately audit their web infrastructure to identify any BuilderEngine CMS 3.5.0 deployments. In the absence of an official patch, mitigation should focus on restricting access to the vulnerable file upload functionality. This can be achieved by implementing strict network-level access controls such as IP whitelisting or VPN-only access to the CMS administration interfaces. Web application firewalls (WAFs) should be configured to detect and block attempts to upload .php or other executable files, and to monitor for suspicious file upload patterns. Additionally, disabling or removing the elFinder file manager or the jQuery File Upload plugin until a secure patch is available is advisable. Organizations should also implement strict input validation and file type restrictions at the application level, ensuring only safe file types are accepted. Regular monitoring of server logs for unusual upload activity and deploying intrusion detection systems can help detect exploitation attempts. Finally, organizations should prepare incident response plans tailored to web server compromises and consider isolating affected systems to prevent lateral movement.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.556Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687014fca83201eaaca979e0

Added to database: 7/10/2025, 7:31:08 PM

Last enriched: 7/17/2025, 9:13:44 PM

Last updated: 8/18/2025, 11:34:11 PM

Views: 33

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats