Skip to main content

CVE-2025-7895: Unrestricted Upload in harry0703 MoneyPrinterTurbo

Medium
VulnerabilityCVE-2025-7895cvecve-2025-7895
Published: Sun Jul 20 2025 (07/20/2025, 14:32:04 UTC)
Source: CVE Database V5
Vendor/Project: harry0703
Product: MoneyPrinterTurbo

Description

A vulnerability, which was classified as critical, was found in harry0703 MoneyPrinterTurbo up to 1.2.6. Affected is the function upload_bgm_file of the file app/controllers/v1/video.py of the component File Extension Handler. The manipulation of the argument File leads to unrestricted upload. It is possible to launch the attack remotely.

AI-Powered Analysis

AILast updated: 07/28/2025, 01:05:09 UTC

Technical Analysis

CVE-2025-7895 is a medium-severity vulnerability classified with a CVSS 4.0 base score of 5.3, affecting the harry0703 MoneyPrinterTurbo software versions 1.2.0 through 1.2.6. The vulnerability exists in the upload_bgm_file function within the app/controllers/v1/video.py component, specifically in the File Extension Handler. The flaw allows an attacker to manipulate the 'File' argument to perform an unrestricted file upload. This means that the software does not properly validate or restrict the types or contents of files being uploaded, enabling an attacker to upload potentially malicious files remotely without authentication or user interaction. The vulnerability can be exploited over the network (AV:N) with low attack complexity (AC:L), no privileges required (PR:L indicates low privileges but not none), and no user interaction needed (UI:N). The impact vector indicates low confidentiality, integrity, and availability impacts individually, but combined they can lead to significant risk, such as remote code execution or system compromise if the uploaded files are executed or processed improperly. No known exploits are currently reported in the wild, and no patches or mitigations have been linked yet. The vulnerability is notable because unrestricted file upload is a common attack vector that can lead to server compromise, data breaches, or service disruption if exploited successfully. The lack of restrictions on file types or content in the upload_bgm_file function suggests insufficient input validation and sanitization controls in the application code.

Potential Impact

For European organizations using MoneyPrinterTurbo, this vulnerability poses a tangible risk of unauthorized remote code execution or system compromise. Attackers could upload malicious scripts or executables, potentially gaining persistent access to internal systems, exfiltrating sensitive financial or operational data, or disrupting services. Given that MoneyPrinterTurbo appears to be a financial or transactional software (implied by its name), exploitation could lead to financial fraud, data leakage, or reputational damage. The medium severity score reflects that while exploitation is feasible remotely without user interaction, the impact on confidentiality, integrity, and availability is rated low individually but could escalate depending on the deployment context. Organizations in Europe with deployments of affected versions may face compliance risks under GDPR if personal data is compromised. Additionally, the financial sector is a frequent target of cyberattacks, increasing the likelihood that threat actors might prioritize exploiting this vulnerability once publicized. The absence of known exploits in the wild currently provides a window for proactive mitigation before widespread exploitation occurs.

Mitigation Recommendations

European organizations should immediately inventory their deployments of MoneyPrinterTurbo to identify affected versions (1.2.0 through 1.2.6). Until an official patch is released, organizations should implement compensating controls such as restricting file upload functionality via network segmentation or application-layer firewalls to trusted users only. Input validation and file type restrictions should be enforced at the web server or reverse proxy level, blocking executable or script file types commonly used in attacks (e.g., .php, .exe, .js). Monitoring upload directories for anomalous files and implementing file integrity monitoring can help detect exploitation attempts. Additionally, organizations should review application logs for suspicious upload activity and prepare incident response plans. Once a patch becomes available, prompt application of the update is critical. If feasible, disabling or limiting the upload_bgm_file functionality temporarily can reduce exposure. Employing web application firewalls (WAFs) with custom rules to detect and block malicious upload patterns can also mitigate risk. Finally, educating developers and administrators on secure file upload practices will help prevent similar vulnerabilities in the future.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-19T11:19:51.559Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687d012da83201eaac02df49

Added to database: 7/20/2025, 2:46:05 PM

Last enriched: 7/28/2025, 1:05:09 AM

Last updated: 8/25/2025, 5:25:18 AM

Views: 25

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats