Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58963: Unrestricted Upload of File with Dangerous Type in 7oroof Medcity

0
Critical
VulnerabilityCVE-2025-58963cvecve-2025-58963
Published: Wed Oct 22 2025 (10/22/2025, 14:32:35 UTC)
Source: CVE Database V5
Vendor/Project: 7oroof
Product: Medcity

Description

Unrestricted Upload of File with Dangerous Type vulnerability in 7oroof Medcity medcity allows Upload a Web Shell to a Web Server.This issue affects Medcity: from n/a through < 1.1.9.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/04/2026, 18:25:30 UTC

Technical Analysis

CVE-2025-58963 is a critical security vulnerability identified in the 7oroof Medcity application, specifically affecting versions prior to 1.1.9. The vulnerability is characterized by an unrestricted file upload flaw that allows attackers to upload files of dangerous types, including web shells, directly to the web server hosting Medcity. This flaw arises due to insufficient validation or filtering of uploaded files, permitting malicious actors to bypass restrictions and execute arbitrary code remotely. The vulnerability has a CVSS v3.1 base score of 9.8, indicating its critical severity, with attack vector as network (AV:N), no required privileges (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). Exploiting this vulnerability enables attackers to gain full control over the affected server, potentially leading to data theft, manipulation, or service disruption. The vulnerability was reserved in early September 2025 and published in October 2025, with no known exploits in the wild or patches released at the time of reporting. The lack of patch availability necessitates immediate mitigation through alternative security controls. Given Medcity's role in managing sensitive medical data, exploitation could have severe consequences for patient privacy and healthcare operations.

Potential Impact

The impact of CVE-2025-58963 is severe and multifaceted. Organizations running vulnerable versions of Medcity risk complete compromise of their web servers, leading to unauthorized access to sensitive medical data, potential alteration or deletion of records, and disruption of healthcare services. The ability to upload and execute web shells allows attackers to maintain persistent access, move laterally within networks, and deploy further malware or ransomware. This can result in significant financial losses, regulatory penalties due to data breaches, and damage to organizational reputation. Healthcare providers and associated entities may face operational downtime, impacting patient care and safety. The vulnerability's ease of exploitation without authentication or user interaction broadens the attack surface, increasing the likelihood of widespread exploitation if weaponized. The absence of known exploits currently offers a window for proactive defense, but the critical nature demands urgent attention to prevent future attacks.

Mitigation Recommendations

Given the absence of an official patch, organizations should implement immediate compensating controls. First, enforce strict server-side validation of uploaded files, restricting allowed file types to safe formats and verifying file content beyond extensions. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious upload attempts and web shell signatures. Restrict upload directories' permissions to prevent execution of uploaded files and isolate them from critical application components. Monitor server logs and network traffic for anomalous activities indicative of exploitation attempts. Conduct regular security audits and penetration testing focused on file upload functionalities. Additionally, segment networks to limit lateral movement if compromise occurs and maintain up-to-date backups to enable recovery. Organizations should stay alert for official patches or updates from 7oroof and apply them promptly once available. User awareness training on security best practices related to file handling can further reduce risk.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-09-06T04:45:10.578Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f8eff404677bbd79439a18

Added to database: 10/22/2025, 2:53:40 PM

Last enriched: 3/4/2026, 6:25:30 PM

Last updated: 3/25/2026, 4:47:57 AM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses