CVE-2025-65844: n/a
EverShop 2.0.1 allows a remote unauthenticated attacker to upload arbitrary files and create directories via the /api/images endpoint. The endpoint is accessible without authentication by default, and server-side validation of uploaded files is insufficient. This can be abused to upload arbitrary content (including non-image files) which could impersonate user/admin login panels (exfiltrating credentials) and to perform a denial-of-service attack by exhausting disk space.
AI Analysis
Technical Summary
CVE-2025-65844 identifies a critical vulnerability in EverShop version 2.0.1, specifically within the /api/images endpoint. This endpoint is accessible without any authentication by default, allowing remote attackers to upload arbitrary files and create directories on the server. The root cause is insufficient server-side validation of uploaded files, which means attackers can upload non-image files, including malicious scripts or HTML pages that could impersonate legitimate user or administrator login interfaces. Such impersonation can facilitate credential theft through phishing attacks hosted on the compromised server. Additionally, attackers can upload large or numerous files to exhaust disk space, leading to denial-of-service (DoS) conditions by preventing the server from functioning properly. The vulnerability is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type). The CVSS 3.1 base score is 7.5, indicating high severity due to the vulnerability's network accessibility (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact primarily affects integrity, as attackers can alter or add malicious content, but confidentiality and availability impacts are limited or indirect. No patches or known exploits have been reported yet, but the risk remains significant given the ease of exploitation and potential damage.
Potential Impact
For European organizations using EverShop 2.0.1, this vulnerability poses a significant risk. Attackers can compromise the integrity of web applications by uploading malicious files that impersonate login pages, potentially leading to credential theft and unauthorized access. This can result in data breaches, loss of customer trust, and regulatory penalties under GDPR if personal data is compromised. The ability to perform denial-of-service attacks by exhausting disk space can disrupt business operations, causing downtime and financial losses. E-commerce platforms are particularly sensitive to such disruptions and reputational damage. Since the vulnerability requires no authentication and no user interaction, it can be exploited at scale by automated attacks, increasing the threat level. Organizations with public-facing EverShop instances are at higher risk, especially if they have not implemented additional access controls or file validation measures.
Mitigation Recommendations
To mitigate CVE-2025-65844, organizations should immediately restrict access to the /api/images endpoint, ideally limiting it to authenticated and authorized users only. Implement strict server-side validation to ensure only legitimate image files with safe extensions and MIME types are accepted, rejecting all other file types. Employ content scanning to detect and block malicious payloads within uploaded files. Monitor server storage usage and set quotas or alerts to detect abnormal disk space consumption indicative of abuse. Regularly audit and review uploaded content directories for unauthorized files. If possible, update EverShop to a patched version once available or apply vendor-provided workarounds. Additionally, deploy web application firewalls (WAFs) with rules to block suspicious upload patterns and consider isolating upload directories from execution privileges to prevent execution of uploaded scripts. Educate administrators about this vulnerability and ensure incident response plans include steps to handle potential exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-65844: n/a
Description
EverShop 2.0.1 allows a remote unauthenticated attacker to upload arbitrary files and create directories via the /api/images endpoint. The endpoint is accessible without authentication by default, and server-side validation of uploaded files is insufficient. This can be abused to upload arbitrary content (including non-image files) which could impersonate user/admin login panels (exfiltrating credentials) and to perform a denial-of-service attack by exhausting disk space.
AI-Powered Analysis
Technical Analysis
CVE-2025-65844 identifies a critical vulnerability in EverShop version 2.0.1, specifically within the /api/images endpoint. This endpoint is accessible without any authentication by default, allowing remote attackers to upload arbitrary files and create directories on the server. The root cause is insufficient server-side validation of uploaded files, which means attackers can upload non-image files, including malicious scripts or HTML pages that could impersonate legitimate user or administrator login interfaces. Such impersonation can facilitate credential theft through phishing attacks hosted on the compromised server. Additionally, attackers can upload large or numerous files to exhaust disk space, leading to denial-of-service (DoS) conditions by preventing the server from functioning properly. The vulnerability is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type). The CVSS 3.1 base score is 7.5, indicating high severity due to the vulnerability's network accessibility (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact primarily affects integrity, as attackers can alter or add malicious content, but confidentiality and availability impacts are limited or indirect. No patches or known exploits have been reported yet, but the risk remains significant given the ease of exploitation and potential damage.
Potential Impact
For European organizations using EverShop 2.0.1, this vulnerability poses a significant risk. Attackers can compromise the integrity of web applications by uploading malicious files that impersonate login pages, potentially leading to credential theft and unauthorized access. This can result in data breaches, loss of customer trust, and regulatory penalties under GDPR if personal data is compromised. The ability to perform denial-of-service attacks by exhausting disk space can disrupt business operations, causing downtime and financial losses. E-commerce platforms are particularly sensitive to such disruptions and reputational damage. Since the vulnerability requires no authentication and no user interaction, it can be exploited at scale by automated attacks, increasing the threat level. Organizations with public-facing EverShop instances are at higher risk, especially if they have not implemented additional access controls or file validation measures.
Mitigation Recommendations
To mitigate CVE-2025-65844, organizations should immediately restrict access to the /api/images endpoint, ideally limiting it to authenticated and authorized users only. Implement strict server-side validation to ensure only legitimate image files with safe extensions and MIME types are accepted, rejecting all other file types. Employ content scanning to detect and block malicious payloads within uploaded files. Monitor server storage usage and set quotas or alerts to detect abnormal disk space consumption indicative of abuse. Regularly audit and review uploaded content directories for unauthorized files. If possible, update EverShop to a patched version once available or apply vendor-provided workarounds. Additionally, deploy web application firewalls (WAFs) with rules to block suspicious upload patterns and consider isolating upload directories from execution privileges to prevent execution of uploaded scripts. Educate administrators about this vulnerability and ensure incident response plans include steps to handle potential exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-11-18T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 692f2aab3286267b25ed5c39
Added to database: 12/2/2025, 6:06:35 PM
Last enriched: 12/9/2025, 6:59:47 PM
Last updated: 1/16/2026, 10:10:27 PM
Views: 71
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-21223: CWE-269: Improper Privilege Management in Microsoft Microsoft Edge (Chromium-based)
MediumCVE-2026-20960: CWE-285: Improper Authorization in Microsoft Microsoft Power Apps
HighCVE-2025-56451: n/a
MediumCVE-2026-23800: CWE-266 Incorrect Privilege Assignment in Modular DS
CriticalCVE-2026-23744: CWE-306: Missing Authentication for Critical Function in MCPJam inspector
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.