Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69770: n/a

0
High
VulnerabilityCVE-2025-69770cvecve-2025-69770
Published: Fri Feb 13 2026 (02/13/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-69770 is a zip slip vulnerability found in the /DesignTools/SkinList. aspx endpoint of MojoPortal CMS version 2. 9. 0. 1. This vulnerability allows attackers to upload a crafted zip file that can lead to arbitrary command execution on the affected server. Exploitation does not require authentication, and no user interaction is needed beyond the upload action. Although no known exploits are currently in the wild, the vulnerability poses a significant risk due to the potential for full system compromise. MojoPortal CMS is a web content management system used by various organizations, including some in Europe, which could be targeted. The lack of a CVSS score necessitates a severity assessment, which is high given the impact and ease of exploitation.

AI-Powered Analysis

AILast updated: 02/13/2026, 18:03:33 UTC

Technical Analysis

CVE-2025-69770 is a critical security vulnerability categorized as a zip slip flaw in the MojoPortal CMS version 2.9.0.1, specifically in the /DesignTools/SkinList.aspx endpoint. Zip slip vulnerabilities occur when an application extracts files from a zip archive without properly sanitizing file paths, allowing attackers to craft zip files that overwrite arbitrary files on the server filesystem. In this case, the vulnerability enables attackers to upload a malicious zip archive that, when processed by the vulnerable endpoint, can lead to arbitrary command execution. This means an attacker can run commands on the server with the privileges of the web application, potentially leading to full system compromise, data theft, or further network penetration. The vulnerability does not require prior authentication or user interaction beyond the upload, increasing its risk. Although no patches or exploit code are currently publicly available, the vulnerability's nature and potential impact make it a high-risk issue. MojoPortal CMS is an open-source web content management system used by various organizations worldwide, including European entities. The lack of a CVSS score means severity must be assessed based on impact and exploitability factors. Given the ability to execute arbitrary commands remotely and without authentication, the severity is high. Organizations using MojoPortal CMS should urgently assess their exposure and implement mitigations or updates once available.

Potential Impact

For European organizations, this vulnerability poses a significant threat to the confidentiality, integrity, and availability of web servers running MojoPortal CMS v2.9.0.1. Successful exploitation could allow attackers to execute arbitrary commands, potentially leading to full server compromise, data breaches, defacement, or use of the server as a pivot point for lateral movement within the network. This could disrupt business operations, damage reputation, and result in regulatory penalties under GDPR if personal data is exposed. Organizations relying on MojoPortal for public-facing websites or internal portals are particularly at risk. The ease of exploitation without authentication increases the likelihood of attacks, especially from opportunistic threat actors scanning for vulnerable instances. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate it, as proof-of-concept or weaponized exploits may emerge. European sectors such as government, education, and SMEs using MojoPortal CMS are vulnerable and should prioritize mitigation.

Mitigation Recommendations

1. Immediately audit all instances of MojoPortal CMS in your environment to identify version 2.9.0.1 deployments. 2. Restrict file upload permissions on the /DesignTools/SkinList.aspx endpoint to trusted users only, or disable the upload feature if not required. 3. Implement strict server-side validation and sanitization of uploaded zip files to prevent directory traversal and path injection attacks. 4. Employ web application firewalls (WAFs) with rules designed to detect and block zip slip attack patterns and suspicious file uploads. 5. Monitor server logs and file system changes for unusual activity related to zip file extraction or command execution attempts. 6. Isolate affected web servers in segmented network zones to limit lateral movement if compromised. 7. Stay alert for official patches or security advisories from MojoPortal developers and apply updates promptly once available. 8. Conduct penetration testing focused on file upload and extraction functionalities to verify mitigation effectiveness. 9. Educate administrators and developers about secure file handling practices to prevent similar vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698f6419c9e1ff5ad8512193

Added to database: 2/13/2026, 5:49:13 PM

Last enriched: 2/13/2026, 6:03:33 PM

Last updated: 2/13/2026, 6:53:13 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats