CVE-2025-65806: n/a
The E-POINT CMS eagle.gsam-1169.1 file upload feature improperly handles nested archive files. An attacker can upload a nested ZIP (a ZIP containing another ZIP) where the inner archive contains an executable file (e.g. webshell.php). When the application extracts the uploaded archives, the executable may be extracted into a web-accessible directory. This can lead to remote code execution (RCE), data disclosure, account compromise, or further system compromise depending on the web server/process privileges. The issue arises from insufficient validation of archive contents and inadequate restrictions on extraction targets.
AI Analysis
Technical Summary
CVE-2025-65806 is a vulnerability identified in the E-POINT CMS eagle.gsam-1169.1 version related to its file upload functionality. The vulnerability arises from the improper handling of nested archive files during extraction. Specifically, the CMS allows an attacker to upload a ZIP archive that contains another ZIP archive, where the inner archive includes executable files such as webshell.php. Upon extraction, the CMS fails to adequately validate the contents and does not enforce strict restrictions on where files are extracted. Consequently, the executable files can be placed into web-accessible directories, enabling an attacker to execute arbitrary code remotely on the server hosting the CMS. This remote code execution (RCE) can lead to severe consequences including data disclosure, compromise of user accounts, and potential full system compromise depending on the privileges of the web server process. The vulnerability is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) and has a CVSS v3.1 base score of 8.0, indicating high severity. The attack vector requires network access and low complexity but does require the attacker to have some level of privileges (PR:L) and user interaction (UI:R). No public exploits are currently known in the wild, but the risk remains significant due to the potential impact. The vulnerability was published on December 4, 2025, with the issue reserved on November 18, 2025. No patches are currently linked, emphasizing the need for immediate mitigation steps by affected organizations.
Potential Impact
For European organizations, the impact of CVE-2025-65806 can be substantial. Organizations using E-POINT CMS for public-facing websites or internal portals risk unauthorized remote code execution, which can lead to data breaches involving sensitive personal or corporate information. This is particularly critical for sectors such as government, finance, healthcare, and critical infrastructure where confidentiality and integrity are paramount. Compromise of web servers can also facilitate lateral movement within networks, enabling attackers to escalate privileges and disrupt availability of services. The vulnerability's exploitation could result in reputational damage, regulatory penalties under GDPR for data breaches, and operational downtime. Since the vulnerability requires authenticated access and user interaction, insider threats or phishing campaigns could be leveraged to exploit it. The lack of available patches increases the urgency for organizations to implement compensating controls to reduce exposure.
Mitigation Recommendations
To mitigate CVE-2025-65806, organizations should immediately implement strict validation of uploaded archive files, including scanning nested archives for executable content before extraction. File upload functionality should enforce whitelist policies restricting allowed file types and disallow nested archives or executable files within archives. Extraction processes must be constrained to non-web-accessible directories with strict path traversal protections to prevent files from being placed in sensitive locations. Employ web application firewalls (WAFs) to detect and block suspicious upload patterns and monitor logs for unusual extraction activities. Limit user privileges to the minimum necessary to reduce the impact of potential exploitation. Since no official patches are currently available, organizations should engage with the vendor for updates and consider temporary disabling of the vulnerable upload feature if feasible. Regular security awareness training to prevent phishing and credential compromise can reduce the risk of authenticated attackers exploiting this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Austria
CVE-2025-65806: n/a
Description
The E-POINT CMS eagle.gsam-1169.1 file upload feature improperly handles nested archive files. An attacker can upload a nested ZIP (a ZIP containing another ZIP) where the inner archive contains an executable file (e.g. webshell.php). When the application extracts the uploaded archives, the executable may be extracted into a web-accessible directory. This can lead to remote code execution (RCE), data disclosure, account compromise, or further system compromise depending on the web server/process privileges. The issue arises from insufficient validation of archive contents and inadequate restrictions on extraction targets.
AI-Powered Analysis
Technical Analysis
CVE-2025-65806 is a vulnerability identified in the E-POINT CMS eagle.gsam-1169.1 version related to its file upload functionality. The vulnerability arises from the improper handling of nested archive files during extraction. Specifically, the CMS allows an attacker to upload a ZIP archive that contains another ZIP archive, where the inner archive includes executable files such as webshell.php. Upon extraction, the CMS fails to adequately validate the contents and does not enforce strict restrictions on where files are extracted. Consequently, the executable files can be placed into web-accessible directories, enabling an attacker to execute arbitrary code remotely on the server hosting the CMS. This remote code execution (RCE) can lead to severe consequences including data disclosure, compromise of user accounts, and potential full system compromise depending on the privileges of the web server process. The vulnerability is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) and has a CVSS v3.1 base score of 8.0, indicating high severity. The attack vector requires network access and low complexity but does require the attacker to have some level of privileges (PR:L) and user interaction (UI:R). No public exploits are currently known in the wild, but the risk remains significant due to the potential impact. The vulnerability was published on December 4, 2025, with the issue reserved on November 18, 2025. No patches are currently linked, emphasizing the need for immediate mitigation steps by affected organizations.
Potential Impact
For European organizations, the impact of CVE-2025-65806 can be substantial. Organizations using E-POINT CMS for public-facing websites or internal portals risk unauthorized remote code execution, which can lead to data breaches involving sensitive personal or corporate information. This is particularly critical for sectors such as government, finance, healthcare, and critical infrastructure where confidentiality and integrity are paramount. Compromise of web servers can also facilitate lateral movement within networks, enabling attackers to escalate privileges and disrupt availability of services. The vulnerability's exploitation could result in reputational damage, regulatory penalties under GDPR for data breaches, and operational downtime. Since the vulnerability requires authenticated access and user interaction, insider threats or phishing campaigns could be leveraged to exploit it. The lack of available patches increases the urgency for organizations to implement compensating controls to reduce exposure.
Mitigation Recommendations
To mitigate CVE-2025-65806, organizations should immediately implement strict validation of uploaded archive files, including scanning nested archives for executable content before extraction. File upload functionality should enforce whitelist policies restricting allowed file types and disallow nested archives or executable files within archives. Extraction processes must be constrained to non-web-accessible directories with strict path traversal protections to prevent files from being placed in sensitive locations. Employ web application firewalls (WAFs) to detect and block suspicious upload patterns and monitor logs for unusual extraction activities. Limit user privileges to the minimum necessary to reduce the impact of potential exploitation. Since no official patches are currently available, organizations should engage with the vendor for updates and consider temporary disabling of the vulnerable upload feature if feasible. Regular security awareness training to prevent phishing and credential compromise can reduce the risk of authenticated attackers exploiting this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-11-18T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6931dff2e9ea82452668a427
Added to database: 12/4/2025, 7:24:34 PM
Last enriched: 12/11/2025, 9:58:59 PM
Last updated: 1/17/2026, 3:58:26 PM
Views: 84
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15530: Reachable Assertion in Open5GS
MediumCVE-2026-0725: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cyberlord92 Integrate Dynamics 365 CRM
MediumCVE-2025-8615: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cubewp1211 CubeWP Framework
MediumCVE-2025-14078: CWE-862 Missing Authorization in shoheitanaka PAYGENT for WooCommerce
MediumCVE-2025-10484: CWE-288 Authentication Bypass Using an Alternate Path or Channel in FmeAddons Registration & Login with Mobile Phone Number for WooCommerce
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.