Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7063: CWE-434 Unrestricted Upload of File with Dangerous Type in Polska Akademia Dostępności PAD CMS

0
Critical
VulnerabilityCVE-2025-7063cvecve-2025-7063cwe-434
Published: Tue Sep 30 2025 (09/30/2025, 10:03:59 UTC)
Source: CVE Database V5
Vendor/Project: Polska Akademia Dostępności
Product: PAD CMS

Description

Due to client-controlled permission check parameter, PAD CMS's file upload functionality allows an unauthenticated remote attacker to upload files of any type and extension without restriction, which can then be executed leading to Remote Code Execution. This issue affects all 3 templates: www, bip and ww+bip. This product is End-Of-Life and producent will not publish patches for this vulnerability.

AI-Powered Analysis

AILast updated: 09/30/2025, 10:11:08 UTC

Technical Analysis

CVE-2025-7063 is a critical vulnerability identified in the Polska Akademia Dostępności (PAD) CMS, a content management system used primarily in Poland. The vulnerability is classified under CWE-434, which pertains to the unrestricted upload of files with dangerous types. The root cause of this vulnerability lies in a client-controlled permission check parameter within the file upload functionality. This flaw allows an unauthenticated remote attacker to bypass any file type or extension restrictions and upload arbitrary files, including malicious executable scripts. Once uploaded, these files can be executed on the server, leading to Remote Code Execution (RCE). This means an attacker can run arbitrary code with the privileges of the web server, potentially taking full control of the affected system. The vulnerability affects all three templates of PAD CMS: www, bip, and ww+bip. Notably, PAD CMS is an End-Of-Life product, and the vendor has declared that no patches will be released to address this issue. The CVSS 4.0 base score is 10.0, indicating a critical severity level. The vector string (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H) highlights that the attack can be performed remotely without authentication or user interaction, with high impact on confidentiality, integrity, and availability, and a high scope of affected components. No known exploits are currently reported in the wild, but the ease of exploitation and severity make this a significant threat. Given the lack of vendor support and patch availability, organizations using PAD CMS are at extreme risk if they continue to operate vulnerable instances.

Potential Impact

For European organizations, particularly those in Poland where PAD CMS is primarily used, this vulnerability poses a severe risk. An attacker exploiting this flaw can gain full control over web servers hosting PAD CMS, leading to data breaches, defacement, disruption of services, and potential lateral movement within the network. Confidential information managed by the CMS could be exfiltrated or altered, damaging organizational reputation and compliance posture, especially under GDPR regulations. The ability to execute arbitrary code remotely without authentication means that attackers can deploy ransomware, establish persistent backdoors, or use the compromised servers as pivot points for further attacks. Since PAD CMS is used in public sector and accessibility-focused institutions, the impact could extend to critical public services and accessibility resources, amplifying the societal and operational consequences. The lack of patches exacerbates the risk, forcing organizations to consider immediate mitigation or migration strategies to avoid exploitation.

Mitigation Recommendations

Given that PAD CMS is End-Of-Life with no forthcoming patches, organizations must adopt compensating controls. Immediate mitigation steps include: 1) Disabling or restricting file upload functionality entirely if not essential. 2) Implementing web application firewalls (WAFs) with custom rules to detect and block suspicious file upload attempts, especially those with executable extensions or unusual content types. 3) Employing strict network segmentation to isolate CMS servers from critical internal networks, limiting potential lateral movement. 4) Conducting thorough audits of existing uploaded files to identify and remove any malicious content. 5) Monitoring server logs and network traffic for anomalous activities indicative of exploitation attempts. 6) Planning and executing a migration to a supported and actively maintained CMS platform to eliminate exposure. 7) Applying least privilege principles to the web server process to minimize the impact of potential code execution. 8) Utilizing intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation patterns related to file upload vulnerabilities. These measures, combined, can reduce the attack surface and mitigate the risk until a full replacement of the vulnerable system is feasible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERT-PL
Date Reserved
2025-07-04T08:50:22.941Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68dbac586e3c400c0ffa5df3

Added to database: 9/30/2025, 10:09:28 AM

Last enriched: 9/30/2025, 10:11:08 AM

Last updated: 10/4/2025, 7:13:22 PM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats