Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-50002: Unrestricted Upload of File with Dangerous Type in Farost Energia

0
Critical
VulnerabilityCVE-2025-50002cvecve-2025-50002
Published: Thu Jan 22 2026 (01/22/2026, 16:51:43 UTC)
Source: CVE Database V5
Vendor/Project: Farost
Product: Energia

Description

Unrestricted Upload of File with Dangerous Type vulnerability in Farost Energia energia allows Upload a Web Shell to a Web Server.This issue affects Energia: from n/a through <= 1.1.2.

AI-Powered Analysis

AILast updated: 01/30/2026, 09:32:24 UTC

Technical Analysis

CVE-2025-50002 is a critical security vulnerability identified in the Farost Energia product, affecting all versions up to and including 1.1.2. The vulnerability stems from an unrestricted file upload mechanism that fails to properly validate or restrict the types of files that can be uploaded to the web server. This flaw allows an unauthenticated attacker to upload malicious files, such as web shells, which are scripts that provide remote command execution capabilities on the compromised server. The vulnerability is remotely exploitable over the network without requiring any user interaction or prior authentication, making it highly accessible to attackers. The CVSS v3.1 base score of 9.8 reflects the high impact on confidentiality, integrity, and availability, as attackers can gain full control over the affected system, potentially leading to data theft, system manipulation, or denial of service. Although no public exploits have been reported yet, the nature of the vulnerability and the ease of exploitation make it a prime target for attackers once exploit code becomes available. The lack of patches at the time of publication increases the urgency for organizations to implement compensating controls. This vulnerability is particularly concerning for environments where Farost Energia is deployed in critical infrastructure or industrial control systems, as compromise could lead to severe operational disruptions.

Potential Impact

For European organizations, the impact of CVE-2025-50002 could be severe, especially for those in the energy, industrial, and critical infrastructure sectors where Farost Energia is deployed. Exploitation could lead to unauthorized remote code execution, allowing attackers to install persistent backdoors, exfiltrate sensitive data, manipulate operational processes, or disrupt services. This could result in significant financial losses, reputational damage, regulatory penalties under GDPR for data breaches, and potential threats to public safety if critical infrastructure is affected. The vulnerability’s ability to be exploited without authentication or user interaction increases the risk of widespread compromise. Organizations relying on Farost Energia for operational technology or energy management systems are particularly vulnerable to targeted attacks that could have cascading effects on supply chains and national energy grids.

Mitigation Recommendations

1. Immediately restrict file upload functionality by implementing strict server-side validation to allow only safe file types and reject all others. 2. Employ web application firewalls (WAFs) with rules designed to detect and block attempts to upload web shells or suspicious file types. 3. Monitor server logs and network traffic for unusual file upload activity or access patterns indicative of exploitation attempts. 4. Isolate systems running Farost Energia from public networks where possible, limiting exposure to external attackers. 5. Apply any vendor-provided patches or updates as soon as they become available. 6. Conduct regular security assessments and penetration testing focused on file upload mechanisms. 7. Implement least privilege principles for web server processes to limit the impact of a successful exploit. 8. Educate IT and security teams about this vulnerability and the importance of rapid response to suspicious activity. 9. Consider deploying endpoint detection and response (EDR) solutions to detect post-exploitation behaviors. 10. Develop and test incident response plans specifically addressing web shell infections and remote code execution scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-06-11T16:08:03.196Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6972590f4623b1157c7faac5

Added to database: 1/22/2026, 5:06:23 PM

Last enriched: 1/30/2026, 9:32:24 AM

Last updated: 2/7/2026, 2:53:26 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats