CVE-2025-67924: Unrestricted Upload of File with Dangerous Type in zozothemes Corpkit
Unrestricted Upload of File with Dangerous Type vulnerability in zozothemes Corpkit corpkit allows Upload a Web Shell to a Web Server.This issue affects Corpkit: from n/a through <= 2.0.
AI Analysis
Technical Summary
CVE-2025-67924 is a critical security vulnerability identified in the zozothemes Corpkit content management system (CMS) affecting versions up to and including 2.0. The vulnerability allows an unauthenticated attacker to upload files of dangerous types, including executable web shells, without any restrictions or validation. This unrestricted file upload vulnerability arises from insufficient input validation and improper handling of uploaded files, enabling attackers to place malicious scripts on the web server. Once a web shell is uploaded, attackers can execute arbitrary commands remotely, leading to full system compromise. The vulnerability has a CVSS v3.1 base score of 9.8, indicating critical severity with network attack vector, low attack complexity, no privileges required, no user interaction, and impacts on confidentiality, integrity, and availability. No known exploits have been observed in the wild yet, but the ease of exploitation and potential impact make it a high-risk threat. The vulnerability affects all installations of Corpkit up to version 2.0, which is used primarily for website and content management. The lack of available patches at the time of publication increases the urgency for organizations to implement interim mitigations. The vulnerability can be exploited remotely over the network without authentication, making it highly accessible to attackers. The presence of a web shell can lead to data theft, website defacement, malware distribution, and further lateral movement within the network. This vulnerability is particularly dangerous because it allows attackers to bypass typical security controls by leveraging the CMS's file upload functionality, a common feature in many web applications. Organizations relying on Corpkit should immediately assess their exposure and prepare to deploy patches or mitigations once available.
Potential Impact
For European organizations, the impact of CVE-2025-67924 is significant due to the potential for complete compromise of web servers running Corpkit. Confidentiality is at risk as attackers can access sensitive data stored or processed by the CMS. Integrity is compromised because attackers can modify website content or inject malicious code, damaging reputation and trust. Availability can be disrupted by attackers deleting or corrupting files or using the server as a platform for further attacks, including denial of service. Organizations in sectors such as government, finance, healthcare, and critical infrastructure that use Corpkit for public-facing websites or internal portals face heightened risks. The ability to upload web shells without authentication means attackers can establish persistent access, evade detection, and escalate privileges. This can lead to data breaches, regulatory non-compliance (e.g., GDPR violations), financial losses, and operational disruptions. The lack of known exploits in the wild currently provides a window for proactive defense, but the critical nature of the vulnerability demands urgent attention. European entities with limited cybersecurity resources or delayed patch management processes are especially vulnerable to exploitation. Additionally, attackers may target European organizations due to geopolitical tensions or the strategic value of their data and infrastructure.
Mitigation Recommendations
1. Immediately audit all Corpkit installations to identify affected versions (<= 2.0). 2. Apply vendor patches or updates as soon as they become available; monitor zozothemes announcements closely. 3. Implement strict file upload validation controls, including whitelisting allowed file types and verifying MIME types server-side. 4. Deploy web application firewalls (WAFs) with rules to detect and block web shell upload attempts and suspicious file uploads. 5. Restrict file upload permissions and isolate upload directories from executable paths to prevent execution of uploaded files. 6. Conduct regular integrity checks on web server files to detect unauthorized changes. 7. Monitor server logs and network traffic for indicators of compromise, such as unusual POST requests or execution of unexpected scripts. 8. Educate system administrators and developers about secure file upload practices and the risks of unrestricted uploads. 9. Consider implementing runtime application self-protection (RASP) to detect and block malicious behaviors in real time. 10. Prepare incident response plans to quickly contain and remediate any exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-67924: Unrestricted Upload of File with Dangerous Type in zozothemes Corpkit
Description
Unrestricted Upload of File with Dangerous Type vulnerability in zozothemes Corpkit corpkit allows Upload a Web Shell to a Web Server.This issue affects Corpkit: from n/a through <= 2.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-67924 is a critical security vulnerability identified in the zozothemes Corpkit content management system (CMS) affecting versions up to and including 2.0. The vulnerability allows an unauthenticated attacker to upload files of dangerous types, including executable web shells, without any restrictions or validation. This unrestricted file upload vulnerability arises from insufficient input validation and improper handling of uploaded files, enabling attackers to place malicious scripts on the web server. Once a web shell is uploaded, attackers can execute arbitrary commands remotely, leading to full system compromise. The vulnerability has a CVSS v3.1 base score of 9.8, indicating critical severity with network attack vector, low attack complexity, no privileges required, no user interaction, and impacts on confidentiality, integrity, and availability. No known exploits have been observed in the wild yet, but the ease of exploitation and potential impact make it a high-risk threat. The vulnerability affects all installations of Corpkit up to version 2.0, which is used primarily for website and content management. The lack of available patches at the time of publication increases the urgency for organizations to implement interim mitigations. The vulnerability can be exploited remotely over the network without authentication, making it highly accessible to attackers. The presence of a web shell can lead to data theft, website defacement, malware distribution, and further lateral movement within the network. This vulnerability is particularly dangerous because it allows attackers to bypass typical security controls by leveraging the CMS's file upload functionality, a common feature in many web applications. Organizations relying on Corpkit should immediately assess their exposure and prepare to deploy patches or mitigations once available.
Potential Impact
For European organizations, the impact of CVE-2025-67924 is significant due to the potential for complete compromise of web servers running Corpkit. Confidentiality is at risk as attackers can access sensitive data stored or processed by the CMS. Integrity is compromised because attackers can modify website content or inject malicious code, damaging reputation and trust. Availability can be disrupted by attackers deleting or corrupting files or using the server as a platform for further attacks, including denial of service. Organizations in sectors such as government, finance, healthcare, and critical infrastructure that use Corpkit for public-facing websites or internal portals face heightened risks. The ability to upload web shells without authentication means attackers can establish persistent access, evade detection, and escalate privileges. This can lead to data breaches, regulatory non-compliance (e.g., GDPR violations), financial losses, and operational disruptions. The lack of known exploits in the wild currently provides a window for proactive defense, but the critical nature of the vulnerability demands urgent attention. European entities with limited cybersecurity resources or delayed patch management processes are especially vulnerable to exploitation. Additionally, attackers may target European organizations due to geopolitical tensions or the strategic value of their data and infrastructure.
Mitigation Recommendations
1. Immediately audit all Corpkit installations to identify affected versions (<= 2.0). 2. Apply vendor patches or updates as soon as they become available; monitor zozothemes announcements closely. 3. Implement strict file upload validation controls, including whitelisting allowed file types and verifying MIME types server-side. 4. Deploy web application firewalls (WAFs) with rules to detect and block web shell upload attempts and suspicious file uploads. 5. Restrict file upload permissions and isolate upload directories from executable paths to prevent execution of uploaded files. 6. Conduct regular integrity checks on web server files to detect unauthorized changes. 7. Monitor server logs and network traffic for indicators of compromise, such as unusual POST requests or execution of unexpected scripts. 8. Educate system administrators and developers about secure file upload practices and the risks of unrestricted uploads. 9. Consider implementing runtime application self-protection (RASP) to detect and block malicious behaviors in real time. 10. Prepare incident response plans to quickly contain and remediate any exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-12-15T09:59:49.436Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 695f7a5ac901b06321d0bbeb
Added to database: 1/8/2026, 9:35:22 AM
Last enriched: 1/22/2026, 9:09:13 PM
Last updated: 2/7/2026, 4:38:23 PM
Views: 30
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2090: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2089: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2088: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2026-2087: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2086: Buffer Overflow in UTT HiPER 810G
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.