Skip to main content

CVE-2025-46001: n/a

Critical
VulnerabilityCVE-2025-46001cvecve-2025-46001
Published: Fri Jul 18 2025 (07/18/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An arbitrary file upload vulnerability in the is_allowed_file_type() function of Filemanager v2.3.0 allows attackers to execute arbitrary code via uploading a crafted PHP file.

AI-Powered Analysis

AILast updated: 07/26/2025, 00:48:14 UTC

Technical Analysis

CVE-2025-46001 is a critical arbitrary file upload vulnerability identified in the is_allowed_file_type() function of Filemanager version 2.3.0. This vulnerability stems from improper validation of uploaded files, allowing an attacker to bypass file type restrictions and upload malicious files, specifically crafted PHP scripts. Once uploaded, these malicious PHP files can be executed on the server, enabling remote code execution (RCE). The vulnerability is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type), indicating that the application fails to properly restrict the types of files that can be uploaded. The CVSS v3.1 base score is 9.8, reflecting its critical severity with attack vector being network (AV:N), no privileges required (PR:N), no user interaction needed (UI:N), and impacts confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). This means an unauthenticated attacker can remotely exploit this vulnerability without any user interaction, leading to full system compromise. The vulnerability was published on July 18, 2025, and no known exploits have been reported in the wild yet. However, given the severity and ease of exploitation, it is highly likely that threat actors will develop exploits rapidly. The lack of patch links suggests that no official fix has been released at the time of this report, increasing the urgency for mitigation.

Potential Impact

For European organizations using Filemanager v2.3.0, this vulnerability poses a significant risk. Successful exploitation can lead to complete system compromise, allowing attackers to execute arbitrary code, steal sensitive data, disrupt services, or use compromised servers as pivot points for further attacks. This can affect confidentiality (data breaches), integrity (unauthorized data modification), and availability (service disruption or denial). Organizations in sectors such as finance, healthcare, government, and critical infrastructure are particularly at risk due to the sensitive nature of their data and services. Additionally, the ability to execute code remotely without authentication makes this vulnerability attractive for automated attacks and worm-like propagation. The absence of a patch increases exposure time, and organizations relying on Filemanager for file handling in web applications must prioritize risk assessment and mitigation. Regulatory compliance under GDPR may also be impacted if data breaches occur due to exploitation, potentially leading to legal and financial penalties.

Mitigation Recommendations

1. Immediate mitigation should include disabling or restricting file upload functionality in Filemanager v2.3.0 until a patch is available. 2. Implement strict server-side validation of uploaded files, including checking MIME types, file extensions, and file content signatures to ensure only allowed file types are accepted. 3. Employ web application firewalls (WAFs) with rules to detect and block attempts to upload PHP or other executable files. 4. Restrict execution permissions on directories used for file uploads to prevent execution of uploaded scripts. 5. Monitor logs for suspicious upload attempts and anomalous file executions. 6. If possible, isolate the Filemanager application in a sandboxed environment or container to limit potential damage. 7. Regularly update and patch Filemanager once an official fix is released. 8. Conduct security audits and penetration testing focused on file upload mechanisms. 9. Educate developers and administrators about secure file upload practices to prevent similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-04-22T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 687a53a7a83201eaacf41ef5

Added to database: 7/18/2025, 2:01:11 PM

Last enriched: 7/26/2025, 12:48:14 AM

Last updated: 8/29/2025, 7:59:11 AM

Views: 27

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats