Skip to main content

CVE-2025-54082: CWE-434: Unrestricted Upload of File with Dangerous Type in marshmallow-packages nova-tiptap

High
VulnerabilityCVE-2025-54082cvecve-2025-54082cwe-434
Published: Mon Jul 21 2025 (07/21/2025, 16:25:11 UTC)
Source: CVE Database V5
Vendor/Project: marshmallow-packages
Product: nova-tiptap

Description

marshmallow-packages/nova-tiptap is a rich text editor for Laravel Nova based on tiptap. Prior to 5.7.0, a vulnerability was discovered in the marshmallow-packages/nova-tiptap Laravel Nova package that allows unauthenticated users to upload arbitrary files to any Laravel disk configured in the application. The vulnerability is due to missing authentication middleware (Nova and Nova.Auth) on the /nova-tiptap/api/file upload endpoint, the lack of validation on uploaded files (no MIME/type or extension restrictions), and the ability for an attacker to choose the disk parameter dynamically. This means an attacker can craft a custom form and send a POST request to /nova-tiptap/api/file, supplying a valid CSRF token, and upload executable or malicious files (e.g., .php, binaries) to public disks such as local, public, or s3. If a publicly accessible storage path is used (e.g. S3 with public access, or Laravel’s public disk), the attacker may gain the ability to execute or distribute arbitrary files — amounting to a potential Remote Code Execution (RCE) vector in some environments. This vulnerability was fixed in 5.7.0.

AI-Powered Analysis

AILast updated: 07/21/2025, 17:01:15 UTC

Technical Analysis

CVE-2025-54082 is a high-severity vulnerability affecting versions of the marshmallow-packages/nova-tiptap Laravel Nova package prior to 5.7.0. Nova-tiptap is a rich text editor integrated into Laravel Nova, a popular administration panel for Laravel applications. The vulnerability arises from the lack of authentication middleware on the /nova-tiptap/api/file upload endpoint, combined with insufficient validation of uploaded files and the ability for attackers to specify the storage disk dynamically. Specifically, unauthenticated attackers can craft POST requests with a valid CSRF token to upload arbitrary files, including executable scripts such as PHP files or binaries, to any Laravel disk configured in the application (e.g., local, public, or S3 storage). Since the endpoint does not restrict MIME types or file extensions, malicious files can be uploaded without validation. If the storage disk is publicly accessible, such as a public S3 bucket or Laravel’s public disk, attackers may execute or distribute these files, potentially leading to Remote Code Execution (RCE). This vulnerability is particularly dangerous because it requires no authentication or user interaction, and the attacker can dynamically select the storage disk, increasing the attack surface. The vulnerability was fixed in version 5.7.0 of nova-tiptap. The CVSS 4.0 base score is 8.1 (high), reflecting the network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the ease of exploitation and potential impact make this a critical issue for affected deployments.

Potential Impact

For European organizations using Laravel Nova with the nova-tiptap package versions prior to 5.7.0, this vulnerability poses a significant risk. Successful exploitation can lead to unauthorized file uploads of malicious payloads, enabling attackers to execute arbitrary code on the server or distribute malware via publicly accessible storage. This can result in full system compromise, data breaches, service disruption, and reputational damage. Given the popularity of Laravel Nova in web application administration, especially among SMEs and enterprises in Europe, the risk extends to a broad range of sectors including finance, healthcare, e-commerce, and public services. The ability to upload files without authentication and validation means attackers can bypass typical security controls, potentially leading to lateral movement within networks or persistent footholds. Additionally, if the uploaded files are hosted on public cloud storage (e.g., AWS S3), the attack surface increases, potentially exposing sensitive data or enabling phishing campaigns. The vulnerability's impact on confidentiality, integrity, and availability is high, and exploitation could violate GDPR requirements on data protection and breach notification, leading to legal and financial consequences for European entities.

Mitigation Recommendations

1. Immediate upgrade: Organizations should upgrade the nova-tiptap package to version 5.7.0 or later, where the vulnerability is patched. 2. Access control: Until patching is possible, restrict access to the /nova-tiptap/api/file endpoint using web application firewalls (WAFs), IP whitelisting, or network segmentation to limit exposure. 3. Storage configuration: Review and restrict permissions on Laravel disks, especially public and S3 buckets, to prevent public write or execute access. Disable public access on S3 buckets unless absolutely necessary and enforce least privilege policies. 4. Input validation: Implement additional server-side validation for uploaded files, including MIME type checks, file extension whitelisting, and content scanning for malicious payloads. 5. Monitoring and detection: Deploy monitoring to detect unusual file uploads, especially executable files, and anomalous POST requests to the vulnerable endpoint. 6. CSRF token management: Ensure CSRF tokens are rotated and validated properly to reduce the risk of token reuse by attackers. 7. Incident response readiness: Prepare to investigate and remediate potential exploitation attempts, including scanning for web shells or unauthorized files in storage. 8. Developer awareness: Educate development teams on secure file upload practices and the importance of authentication middleware on sensitive endpoints.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-07-16T13:22:18.207Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687e6ecfa83201eaac11ade2

Added to database: 7/21/2025, 4:46:07 PM

Last enriched: 7/21/2025, 5:01:15 PM

Last updated: 8/18/2025, 11:34:00 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats