Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59118: CWE-434 Unrestricted Upload of File with Dangerous Type in Apache Software Foundation Apache OFBiz

0
High
VulnerabilityCVE-2025-59118cvecve-2025-59118cwe-434
Published: Wed Nov 12 2025 (11/12/2025, 09:15:54 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache OFBiz

Description

Unrestricted Upload of File with Dangerous Type vulnerability in Apache OFBiz. This issue affects Apache OFBiz: before 24.09.03. Users are recommended to upgrade to version 24.09.03, which fixes the issue.

AI-Powered Analysis

AILast updated: 11/19/2025, 11:15:28 UTC

Technical Analysis

CVE-2025-59118 is a vulnerability identified in the Apache Software Foundation's Apache OFBiz product, affecting versions before 24.09.03. The issue is an unrestricted upload of files with dangerous types, classified under CWE-434, which refers to improper restrictions on file upload types. This vulnerability allows unauthenticated attackers to upload arbitrary files, including potentially malicious scripts or executables, to the server hosting Apache OFBiz. Exploitation requires no user interaction and can be performed remotely over the network with low attack complexity, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). Successful exploitation can lead to partial loss of confidentiality, integrity, and availability of the affected system, such as unauthorized data access, modification, or denial of service. Apache OFBiz is an open-source enterprise automation software used for ERP, CRM, and e-commerce, making it a valuable target for attackers seeking to disrupt business operations or steal sensitive data. The vulnerability was reserved on 2025-09-09 and published on 2025-11-12, with no known exploits in the wild at the time of reporting. The recommended remediation is to upgrade to Apache OFBiz version 24.09.03, which addresses this issue. Additional technical mitigations include implementing strict file type validation, restricting upload permissions, and monitoring file upload activities to detect anomalies.

Potential Impact

For European organizations, the impact of CVE-2025-59118 can be significant, especially for those relying on Apache OFBiz for critical business functions such as supply chain management, customer relationship management, and e-commerce platforms. Exploitation could lead to unauthorized access to sensitive business data, insertion of malicious code, and potential disruption of services, affecting business continuity and customer trust. The confidentiality breach could expose personal data subject to GDPR regulations, leading to legal and financial penalties. Integrity compromises might allow attackers to alter transactional data or business logic, causing financial losses or operational errors. Availability impacts could result in downtime, affecting revenue and reputation. Given the ease of exploitation and lack of required authentication, attackers could rapidly target vulnerable systems across Europe. The absence of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for remediation due to the high severity and potential for future exploitation.

Mitigation Recommendations

1. Immediate upgrade of Apache OFBiz installations to version 24.09.03 or later to apply the official patch addressing the vulnerability. 2. Implement strict server-side validation of uploaded files, including checking MIME types, file extensions, and content inspection to block dangerous file types. 3. Restrict file upload permissions to authenticated and authorized users only, even if the vulnerability allows unauthenticated uploads, to add an additional security layer. 4. Deploy web application firewalls (WAFs) with custom rules to detect and block suspicious file upload attempts targeting OFBiz endpoints. 5. Monitor logs and file upload directories for unusual or unexpected files, enabling rapid detection and response to exploitation attempts. 6. Conduct regular security assessments and penetration testing focused on file upload functionalities. 7. Educate development and operations teams on secure file handling practices and ensure secure configuration management. 8. Isolate the OFBiz application environment to limit lateral movement in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
apache
Date Reserved
2025-09-09T09:57:31.247Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6914547632a6693f6a1c8aca

Added to database: 11/12/2025, 9:33:42 AM

Last enriched: 11/19/2025, 11:15:28 AM

Last updated: 2/7/2026, 1:21:53 PM

Views: 208

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats