CVE-2025-65806: n/a
The E-POINT CMS eagle.gsam-1169.1 file upload feature improperly handles nested archive files. An attacker can upload a nested ZIP (a ZIP containing another ZIP) where the inner archive contains an executable file (e.g. webshell.php). When the application extracts the uploaded archives, the executable may be extracted into a web-accessible directory. This can lead to remote code execution (RCE), data disclosure, account compromise, or further system compromise depending on the web server/process privileges. The issue arises from insufficient validation of archive contents and inadequate restrictions on extraction targets.
AI Analysis
Technical Summary
CVE-2025-65806 identifies a vulnerability in the E-POINT CMS eagle.gsam-1169.1 version's file upload functionality, specifically in its handling of nested archive files. The vulnerability arises because the CMS does not properly validate the contents of nested ZIP archives during extraction. An attacker can craft a ZIP archive containing another ZIP archive, where the inner archive includes executable files such as webshell.php. When the CMS extracts these nested archives, it may inadvertently place the executable files into web-accessible directories. This improper extraction can lead to remote code execution (RCE), allowing attackers to execute arbitrary code on the server. Depending on the privileges of the web server process, this can escalate to data disclosure, account compromise, or full system compromise. The underlying issue is classified under CWE-434, which relates to unrestricted file upload vulnerabilities. The vulnerability requires the attacker to have high privileges and user interaction, which limits the ease of exploitation. No patches or known exploits are currently available, and the affected versions are not explicitly specified. The CVSS score is 4.3 (medium severity), reflecting limited confidentiality, integrity, and availability impacts with some exploitation barriers.
Potential Impact
The potential impact of CVE-2025-65806 is significant for organizations using the E-POINT CMS eagle.gsam-1169.1 or similar vulnerable versions. Successful exploitation can lead to remote code execution, allowing attackers to run arbitrary commands on the affected server. This can result in unauthorized access to sensitive data, modification or deletion of content, installation of persistent backdoors, and lateral movement within the network. The severity depends on the privileges of the web server process; higher privileges increase the risk of full system compromise. Data confidentiality and integrity are at risk, and availability may be affected if attackers disrupt services or deploy ransomware. Although exploitation requires high privileges and user interaction, the vulnerability could be leveraged in targeted attacks or combined with other vulnerabilities to escalate privileges. Organizations with public-facing web servers running this CMS are particularly vulnerable, potentially impacting customer data, intellectual property, and operational continuity.
Mitigation Recommendations
To mitigate CVE-2025-65806, organizations should implement the following specific measures: 1) Enforce strict validation of uploaded archive files, including scanning nested archives for executable or suspicious files before extraction. 2) Restrict extraction paths to non-web-accessible directories to prevent placing executables in locations accessible via the web server. 3) Implement file type whitelisting and reject archives containing executable file extensions such as .php, .exe, .sh, etc. 4) Apply the principle of least privilege to the web server process, limiting its ability to write or execute files in sensitive directories. 5) Monitor file upload activities and extraction logs for anomalies or unexpected file types. 6) If possible, disable nested archive extraction or limit archive depth during extraction. 7) Keep the CMS and all related components updated with security patches once available. 8) Conduct regular security assessments and penetration tests focusing on file upload functionalities. 9) Educate administrators and users about the risks of uploading untrusted archives. These targeted actions go beyond generic advice and address the root cause and exploitation vectors of this vulnerability.
Affected Countries
South Korea, China, Vietnam, Indonesia, Malaysia, Thailand, Philippines
CVE-2025-65806: n/a
Description
The E-POINT CMS eagle.gsam-1169.1 file upload feature improperly handles nested archive files. An attacker can upload a nested ZIP (a ZIP containing another ZIP) where the inner archive contains an executable file (e.g. webshell.php). When the application extracts the uploaded archives, the executable may be extracted into a web-accessible directory. This can lead to remote code execution (RCE), data disclosure, account compromise, or further system compromise depending on the web server/process privileges. The issue arises from insufficient validation of archive contents and inadequate restrictions on extraction targets.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-65806 identifies a vulnerability in the E-POINT CMS eagle.gsam-1169.1 version's file upload functionality, specifically in its handling of nested archive files. The vulnerability arises because the CMS does not properly validate the contents of nested ZIP archives during extraction. An attacker can craft a ZIP archive containing another ZIP archive, where the inner archive includes executable files such as webshell.php. When the CMS extracts these nested archives, it may inadvertently place the executable files into web-accessible directories. This improper extraction can lead to remote code execution (RCE), allowing attackers to execute arbitrary code on the server. Depending on the privileges of the web server process, this can escalate to data disclosure, account compromise, or full system compromise. The underlying issue is classified under CWE-434, which relates to unrestricted file upload vulnerabilities. The vulnerability requires the attacker to have high privileges and user interaction, which limits the ease of exploitation. No patches or known exploits are currently available, and the affected versions are not explicitly specified. The CVSS score is 4.3 (medium severity), reflecting limited confidentiality, integrity, and availability impacts with some exploitation barriers.
Potential Impact
The potential impact of CVE-2025-65806 is significant for organizations using the E-POINT CMS eagle.gsam-1169.1 or similar vulnerable versions. Successful exploitation can lead to remote code execution, allowing attackers to run arbitrary commands on the affected server. This can result in unauthorized access to sensitive data, modification or deletion of content, installation of persistent backdoors, and lateral movement within the network. The severity depends on the privileges of the web server process; higher privileges increase the risk of full system compromise. Data confidentiality and integrity are at risk, and availability may be affected if attackers disrupt services or deploy ransomware. Although exploitation requires high privileges and user interaction, the vulnerability could be leveraged in targeted attacks or combined with other vulnerabilities to escalate privileges. Organizations with public-facing web servers running this CMS are particularly vulnerable, potentially impacting customer data, intellectual property, and operational continuity.
Mitigation Recommendations
To mitigate CVE-2025-65806, organizations should implement the following specific measures: 1) Enforce strict validation of uploaded archive files, including scanning nested archives for executable or suspicious files before extraction. 2) Restrict extraction paths to non-web-accessible directories to prevent placing executables in locations accessible via the web server. 3) Implement file type whitelisting and reject archives containing executable file extensions such as .php, .exe, .sh, etc. 4) Apply the principle of least privilege to the web server process, limiting its ability to write or execute files in sensitive directories. 5) Monitor file upload activities and extraction logs for anomalies or unexpected file types. 6) If possible, disable nested archive extraction or limit archive depth during extraction. 7) Keep the CMS and all related components updated with security patches once available. 8) Conduct regular security assessments and penetration tests focusing on file upload functionalities. 9) Educate administrators and users about the risks of uploading untrusted archives. These targeted actions go beyond generic advice and address the root cause and exploitation vectors of this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-11-18T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6931dff2e9ea82452668a427
Added to database: 12/4/2025, 7:24:34 PM
Last enriched: 3/12/2026, 7:11:47 PM
Last updated: 3/23/2026, 9:35:47 PM
Views: 115
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.