Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63695: n/a

0
Critical
VulnerabilityCVE-2025-63695cvecve-2025-63695
Published: Tue Nov 18 2025 (11/18/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

DzzOffice v2.3.7 and before is vulnerable to Arbitrary File Upload in /dzz/system/ueditor/php/controller.php.

AI-Powered Analysis

AILast updated: 11/18/2025, 19:13:22 UTC

Technical Analysis

CVE-2025-63695 identifies a security vulnerability in DzzOffice version 2.3.7 and earlier, located in the file upload handling functionality within /dzz/system/ueditor/php/controller.php. The vulnerability permits arbitrary file uploads, meaning an attacker can upload files of their choosing without proper validation or restrictions. This type of vulnerability is critical because it can allow attackers to upload malicious scripts or executables, which can then be executed on the server, leading to remote code execution, privilege escalation, or full system compromise. The vulnerability was reserved on October 27, 2025, and published on November 18, 2025, but no CVSS score or patch links are currently available, and no exploits have been observed in the wild. The lack of authentication requirements or user interaction details suggests the upload endpoint may be accessible to unauthenticated users, increasing the risk. The affected component, UEditor, is a widely used web-based rich text editor integrated into DzzOffice, a collaborative office platform. Attackers exploiting this vulnerability could bypass file type restrictions or other security controls, upload web shells or malware, and gain persistent access to the affected system. This vulnerability threatens the confidentiality, integrity, and availability of data and services hosted on vulnerable DzzOffice instances.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to unauthorized access to sensitive corporate data, disruption of business operations, and potential lateral movement within internal networks. Organizations in sectors such as government, finance, healthcare, and education that use DzzOffice for collaboration and document management are particularly at risk. Compromise could result in data breaches, intellectual property theft, ransomware deployment, or defacement of web services. The arbitrary file upload can also serve as a foothold for further attacks, including privilege escalation and persistent backdoors. The absence of known exploits currently limits immediate widespread impact, but the vulnerability's nature makes it a high-risk target once exploit code becomes available. European entities with public-facing DzzOffice installations are especially vulnerable to remote exploitation attempts. The impact extends beyond individual organizations to potentially affect supply chains and critical infrastructure relying on this software.

Mitigation Recommendations

Organizations should immediately audit their DzzOffice installations to identify affected versions (2.3.7 and earlier). Although no official patches are currently linked, monitoring vendor advisories and applying updates promptly upon release is critical. In the interim, restrict access to the /dzz/system/ueditor/php/controller.php endpoint using network-level controls such as IP whitelisting or VPN access. Implement strict file upload validation rules, including whitelisting allowed file types and scanning uploaded files for malware. Deploy web application firewalls (WAFs) with rules to detect and block suspicious file upload attempts targeting this endpoint. Conduct regular security assessments and penetration testing focused on file upload functionalities. Disable or limit file upload features if not essential. Employ robust logging and monitoring to detect anomalous activities related to file uploads. Educate administrators and users about the risks and signs of compromise related to arbitrary file upload vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691cc5445990fe54bdeeced6

Added to database: 11/18/2025, 7:13:08 PM

Last enriched: 11/18/2025, 7:13:22 PM

Last updated: 11/21/2025, 7:14:09 PM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats