Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-52758: Unrestricted Upload of File with Dangerous Type in Gesundheit Bewegt GmbH Zippy

0
Critical
VulnerabilityCVE-2025-52758cvecve-2025-52758
Published: Wed Oct 22 2025 (10/22/2025, 14:32:27 UTC)
Source: CVE Database V5
Vendor/Project: Gesundheit Bewegt GmbH
Product: Zippy

Description

Unrestricted Upload of File with Dangerous Type vulnerability in Gesundheit Bewegt GmbH Zippy zippy allows Using Malicious Files.This issue affects Zippy: from n/a through <= 1.7.0.

AI-Powered Analysis

AILast updated: 01/20/2026, 20:30:39 UTC

Technical Analysis

CVE-2025-52758 is a critical security vulnerability found in the Zippy product developed by Gesundheit Bewegt GmbH, affecting all versions up to and including 1.7.0. The vulnerability is characterized by an unrestricted upload of files with dangerous types, meaning the application does not properly validate or restrict the types of files users can upload. This flaw allows an unauthenticated attacker to upload malicious files, such as web shells or scripts, which can then be executed on the server or used to compromise the system's confidentiality and integrity. The vulnerability has a CVSS 3.1 base score of 9.1, indicating a critical severity level, with attack vector being network-based (AV:N), no privileges required (PR:N), no user interaction needed (UI:N), and a scope that remains unchanged (S:U). The impact on confidentiality and integrity is high (C:H/I:H), while availability is not affected (A:N). Although no public exploits are known at this time, the nature of the vulnerability makes it highly exploitable, especially in environments where Zippy is exposed to the internet or untrusted users. The lack of patch links suggests that a fix may not yet be publicly available, increasing the urgency for organizations to implement interim mitigations. This vulnerability could be leveraged to deploy malware, conduct data exfiltration, or pivot within a network, posing a significant threat to affected organizations.

Potential Impact

For European organizations, the impact of CVE-2025-52758 can be severe. Organizations using Zippy for file sharing, collaboration, or content management may face unauthorized disclosure of sensitive data if attackers upload and execute malicious files. The integrity of data and systems can be compromised, leading to potential data manipulation or destruction. The vulnerability could also be used as a foothold for further attacks within corporate networks, including lateral movement and deployment of ransomware or other malware. Critical sectors such as healthcare, finance, and government agencies that rely on Zippy for internal or external file handling are particularly at risk. The disruption caused by a successful exploit could result in operational downtime, regulatory penalties under GDPR for data breaches, and reputational damage. Since the vulnerability requires no authentication or user interaction, the attack surface is broad, increasing the likelihood of exploitation if the product is internet-facing or accessible by untrusted users.

Mitigation Recommendations

Until an official patch is released, European organizations should implement strict file upload validation controls at the application and network levels. This includes restricting allowed file types to a safe whitelist, scanning uploaded files for malware, and enforcing size and content restrictions. Deploying web application firewalls (WAFs) with rules to detect and block suspicious upload attempts can reduce risk. Network segmentation should be used to isolate systems running Zippy from critical infrastructure. Monitoring and logging file upload activities can help detect anomalous behavior early. Organizations should also review user permissions to limit upload capabilities to trusted users only. Once a patch is available, immediate application is critical. Additionally, conducting security awareness training to inform administrators about this vulnerability and encouraging regular security assessments of the Zippy deployment environment will strengthen defenses.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-06-19T10:03:02.782Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f8eff104677bbd7943996a

Added to database: 10/22/2025, 2:53:37 PM

Last enriched: 1/20/2026, 8:30:39 PM

Last updated: 2/7/2026, 5:54:00 PM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats