Skip to main content

CVE-2025-34163: CWE-434 Unrestricted Upload of File with Dangerous Type in Qingdao Dongsheng Weiye Software Co., Ltd. Dongsheng Logistics Software

Critical
VulnerabilityCVE-2025-34163cvecve-2025-34163cwe-434
Published: Wed Aug 27 2025 (08/27/2025, 21:24:43 UTC)
Source: CVE Database V5
Vendor/Project: Qingdao Dongsheng Weiye Software Co., Ltd.
Product: Dongsheng Logistics Software

Description

Dongsheng Logistics Software exposes an unauthenticated endpoint at /CommMng/Print/UploadMailFile that fails to enforce proper file type validation and access control. An attacker can upload arbitrary files, including executable scripts such as .ashx, via a crafted multipart/form-data POST request. This allows remote code execution on the server, potentially leading to full system compromise. The vulnerability is presumed to affect builds released prior to July 2025 and is said to be remediated in newer versions of the product, though the exact affected range remains undefined. Exploitation evidence was first observed by the Shadowserver Foundation on 2025-07-23 UTC.

AI-Powered Analysis

AILast updated: 08/27/2025, 21:48:09 UTC

Technical Analysis

CVE-2025-34163 is a critical vulnerability identified in Qingdao Dongsheng Weiye Software Co., Ltd.'s Dongsheng Logistics Software. The flaw is categorized under CWE-434, which pertains to the unrestricted upload of files with dangerous types. Specifically, the software exposes an unauthenticated endpoint at /CommMng/Print/UploadMailFile that does not enforce proper file type validation or access control. This endpoint accepts multipart/form-data POST requests, allowing an attacker to upload arbitrary files, including executable scripts such as .ashx files. The lack of authentication combined with insufficient validation enables remote attackers to execute arbitrary code on the server hosting the logistics software. This can lead to full system compromise, including unauthorized data access, modification, or destruction, and potentially lateral movement within the affected network. The vulnerability affects all builds released prior to July 2025, with newer versions reportedly remediating the issue, although the exact version range affected is not clearly defined. The CVSS 4.0 base score is 10.0, reflecting the highest severity due to its network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the critical nature and ease of exploitation make it a significant threat to organizations using this software.

Potential Impact

For European organizations utilizing Dongsheng Logistics Software, this vulnerability presents a severe risk. Logistics and supply chain management are critical sectors in Europe, and compromise of such software could disrupt operations, leading to delays, financial losses, and reputational damage. The ability for unauthenticated remote code execution means attackers can gain persistent access, potentially exfiltrating sensitive shipment data, customer information, or internal business processes. This could also facilitate ransomware deployment or use of the compromised systems as pivot points for broader network intrusions. Given the strategic importance of logistics in European economies and the interconnected nature of supply chains, exploitation could have cascading effects beyond the initially targeted organization. Furthermore, regulatory frameworks such as GDPR impose strict data protection requirements, and breaches resulting from this vulnerability could lead to significant compliance penalties.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately verify if their Dongsheng Logistics Software installations are running versions released before July 2025 and prioritize upgrading to the latest patched versions once available. In the absence of an official patch, organizations should implement strict network-level controls to restrict access to the vulnerable endpoint, including firewall rules limiting inbound traffic to trusted IPs and VPN-only access. Web application firewalls (WAFs) should be configured to detect and block suspicious multipart/form-data POST requests, especially those attempting to upload executable file types such as .ashx. Additionally, organizations should conduct thorough audits of their systems for any signs of compromise, including unexpected files or processes. Implementing strict file upload validation on any custom integrations and monitoring logs for anomalous activity related to the /CommMng/Print/UploadMailFile endpoint is critical. Finally, organizations should ensure robust incident response plans are in place to quickly contain and remediate any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.566Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68af7981ad5a09ad006645b7

Added to database: 8/27/2025, 9:32:49 PM

Last enriched: 8/27/2025, 9:48:09 PM

Last updated: 8/31/2025, 5:58:14 AM

Views: 21

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats