CVE-2025-59118: CWE-434 Unrestricted Upload of File with Dangerous Type in Apache Software Foundation Apache OFBiz
Unrestricted Upload of File with Dangerous Type vulnerability in Apache OFBiz. This issue affects Apache OFBiz: before 24.09.03. Users are recommended to upgrade to version 24.09.03, which fixes the issue.
AI Analysis
Technical Summary
CVE-2025-59118 is a vulnerability identified in the Apache Software Foundation's Apache OFBiz product, affecting versions before 24.09.03. The issue is an unrestricted upload of files with dangerous types, classified under CWE-434, which refers to improper restrictions on file upload types. This vulnerability allows unauthenticated attackers to upload arbitrary files, including potentially malicious scripts or executables, to the server hosting Apache OFBiz. Exploitation requires no user interaction and can be performed remotely over the network with low attack complexity, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). Successful exploitation can lead to partial loss of confidentiality, integrity, and availability of the affected system, such as unauthorized data access, modification, or denial of service. Apache OFBiz is an open-source enterprise automation software used for ERP, CRM, and e-commerce, making it a valuable target for attackers seeking to disrupt business operations or steal sensitive data. The vulnerability was reserved on 2025-09-09 and published on 2025-11-12, with no known exploits in the wild at the time of reporting. The recommended remediation is to upgrade to Apache OFBiz version 24.09.03, which addresses this issue. Additional technical mitigations include implementing strict file type validation, restricting upload permissions, and monitoring file upload activities to detect anomalies.
Potential Impact
For European organizations, the impact of CVE-2025-59118 can be significant, especially for those relying on Apache OFBiz for critical business functions such as supply chain management, customer relationship management, and e-commerce platforms. Exploitation could lead to unauthorized access to sensitive business data, insertion of malicious code, and potential disruption of services, affecting business continuity and customer trust. The confidentiality breach could expose personal data subject to GDPR regulations, leading to legal and financial penalties. Integrity compromises might allow attackers to alter transactional data or business logic, causing financial losses or operational errors. Availability impacts could result in downtime, affecting revenue and reputation. Given the ease of exploitation and lack of required authentication, attackers could rapidly target vulnerable systems across Europe. The absence of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for remediation due to the high severity and potential for future exploitation.
Mitigation Recommendations
1. Immediate upgrade of Apache OFBiz installations to version 24.09.03 or later to apply the official patch addressing the vulnerability. 2. Implement strict server-side validation of uploaded files, including checking MIME types, file extensions, and content inspection to block dangerous file types. 3. Restrict file upload permissions to authenticated and authorized users only, even if the vulnerability allows unauthenticated uploads, to add an additional security layer. 4. Deploy web application firewalls (WAFs) with custom rules to detect and block suspicious file upload attempts targeting OFBiz endpoints. 5. Monitor logs and file upload directories for unusual or unexpected files, enabling rapid detection and response to exploitation attempts. 6. Conduct regular security assessments and penetration testing focused on file upload functionalities. 7. Educate development and operations teams on secure file handling practices and ensure secure configuration management. 8. Isolate the OFBiz application environment to limit lateral movement in case of compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-59118: CWE-434 Unrestricted Upload of File with Dangerous Type in Apache Software Foundation Apache OFBiz
Description
Unrestricted Upload of File with Dangerous Type vulnerability in Apache OFBiz. This issue affects Apache OFBiz: before 24.09.03. Users are recommended to upgrade to version 24.09.03, which fixes the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-59118 is a vulnerability identified in the Apache Software Foundation's Apache OFBiz product, affecting versions before 24.09.03. The issue is an unrestricted upload of files with dangerous types, classified under CWE-434, which refers to improper restrictions on file upload types. This vulnerability allows unauthenticated attackers to upload arbitrary files, including potentially malicious scripts or executables, to the server hosting Apache OFBiz. Exploitation requires no user interaction and can be performed remotely over the network with low attack complexity, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). Successful exploitation can lead to partial loss of confidentiality, integrity, and availability of the affected system, such as unauthorized data access, modification, or denial of service. Apache OFBiz is an open-source enterprise automation software used for ERP, CRM, and e-commerce, making it a valuable target for attackers seeking to disrupt business operations or steal sensitive data. The vulnerability was reserved on 2025-09-09 and published on 2025-11-12, with no known exploits in the wild at the time of reporting. The recommended remediation is to upgrade to Apache OFBiz version 24.09.03, which addresses this issue. Additional technical mitigations include implementing strict file type validation, restricting upload permissions, and monitoring file upload activities to detect anomalies.
Potential Impact
For European organizations, the impact of CVE-2025-59118 can be significant, especially for those relying on Apache OFBiz for critical business functions such as supply chain management, customer relationship management, and e-commerce platforms. Exploitation could lead to unauthorized access to sensitive business data, insertion of malicious code, and potential disruption of services, affecting business continuity and customer trust. The confidentiality breach could expose personal data subject to GDPR regulations, leading to legal and financial penalties. Integrity compromises might allow attackers to alter transactional data or business logic, causing financial losses or operational errors. Availability impacts could result in downtime, affecting revenue and reputation. Given the ease of exploitation and lack of required authentication, attackers could rapidly target vulnerable systems across Europe. The absence of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for remediation due to the high severity and potential for future exploitation.
Mitigation Recommendations
1. Immediate upgrade of Apache OFBiz installations to version 24.09.03 or later to apply the official patch addressing the vulnerability. 2. Implement strict server-side validation of uploaded files, including checking MIME types, file extensions, and content inspection to block dangerous file types. 3. Restrict file upload permissions to authenticated and authorized users only, even if the vulnerability allows unauthenticated uploads, to add an additional security layer. 4. Deploy web application firewalls (WAFs) with custom rules to detect and block suspicious file upload attempts targeting OFBiz endpoints. 5. Monitor logs and file upload directories for unusual or unexpected files, enabling rapid detection and response to exploitation attempts. 6. Conduct regular security assessments and penetration testing focused on file upload functionalities. 7. Educate development and operations teams on secure file handling practices and ensure secure configuration management. 8. Isolate the OFBiz application environment to limit lateral movement in case of compromise.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apache
- Date Reserved
- 2025-09-09T09:57:31.247Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6914547632a6693f6a1c8aca
Added to database: 11/12/2025, 9:33:42 AM
Last enriched: 11/19/2025, 11:15:28 AM
Last updated: 2/6/2026, 11:36:39 PM
Views: 206
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighCVE-2026-25803: CWE-798: Use of Hard-coded Credentials in denpiligrim 3dp-manager
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.