CVE-2025-7895: Unrestricted Upload in harry0703 MoneyPrinterTurbo
A vulnerability, which was classified as critical, was found in harry0703 MoneyPrinterTurbo up to 1.2.6. Affected is the function upload_bgm_file of the file app/controllers/v1/video.py of the component File Extension Handler. The manipulation of the argument File leads to unrestricted upload. It is possible to launch the attack remotely.
AI Analysis
Technical Summary
CVE-2025-7895 is a medium-severity vulnerability classified with a CVSS 4.0 base score of 5.3, affecting the harry0703 MoneyPrinterTurbo software versions 1.2.0 through 1.2.6. The vulnerability exists in the upload_bgm_file function within the app/controllers/v1/video.py component, specifically in the File Extension Handler. The flaw allows an attacker to manipulate the 'File' argument to perform an unrestricted file upload. This means that the software does not properly validate or restrict the types or contents of files being uploaded, enabling an attacker to upload potentially malicious files remotely without authentication or user interaction. The vulnerability can be exploited over the network (AV:N) with low attack complexity (AC:L), no privileges required (PR:L indicates low privileges but not none), and no user interaction needed (UI:N). The impact vector indicates low confidentiality, integrity, and availability impacts individually, but combined they can lead to significant risk, such as remote code execution or system compromise if the uploaded files are executed or processed improperly. No known exploits are currently reported in the wild, and no patches or mitigations have been linked yet. The vulnerability is notable because unrestricted file upload is a common attack vector that can lead to server compromise, data breaches, or service disruption if exploited successfully. The lack of restrictions on file types or content in the upload_bgm_file function suggests insufficient input validation and sanitization controls in the application code.
Potential Impact
For European organizations using MoneyPrinterTurbo, this vulnerability poses a tangible risk of unauthorized remote code execution or system compromise. Attackers could upload malicious scripts or executables, potentially gaining persistent access to internal systems, exfiltrating sensitive financial or operational data, or disrupting services. Given that MoneyPrinterTurbo appears to be a financial or transactional software (implied by its name), exploitation could lead to financial fraud, data leakage, or reputational damage. The medium severity score reflects that while exploitation is feasible remotely without user interaction, the impact on confidentiality, integrity, and availability is rated low individually but could escalate depending on the deployment context. Organizations in Europe with deployments of affected versions may face compliance risks under GDPR if personal data is compromised. Additionally, the financial sector is a frequent target of cyberattacks, increasing the likelihood that threat actors might prioritize exploiting this vulnerability once publicized. The absence of known exploits in the wild currently provides a window for proactive mitigation before widespread exploitation occurs.
Mitigation Recommendations
European organizations should immediately inventory their deployments of MoneyPrinterTurbo to identify affected versions (1.2.0 through 1.2.6). Until an official patch is released, organizations should implement compensating controls such as restricting file upload functionality via network segmentation or application-layer firewalls to trusted users only. Input validation and file type restrictions should be enforced at the web server or reverse proxy level, blocking executable or script file types commonly used in attacks (e.g., .php, .exe, .js). Monitoring upload directories for anomalous files and implementing file integrity monitoring can help detect exploitation attempts. Additionally, organizations should review application logs for suspicious upload activity and prepare incident response plans. Once a patch becomes available, prompt application of the update is critical. If feasible, disabling or limiting the upload_bgm_file functionality temporarily can reduce exposure. Employing web application firewalls (WAFs) with custom rules to detect and block malicious upload patterns can also mitigate risk. Finally, educating developers and administrators on secure file upload practices will help prevent similar vulnerabilities in the future.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-7895: Unrestricted Upload in harry0703 MoneyPrinterTurbo
Description
A vulnerability, which was classified as critical, was found in harry0703 MoneyPrinterTurbo up to 1.2.6. Affected is the function upload_bgm_file of the file app/controllers/v1/video.py of the component File Extension Handler. The manipulation of the argument File leads to unrestricted upload. It is possible to launch the attack remotely.
AI-Powered Analysis
Technical Analysis
CVE-2025-7895 is a medium-severity vulnerability classified with a CVSS 4.0 base score of 5.3, affecting the harry0703 MoneyPrinterTurbo software versions 1.2.0 through 1.2.6. The vulnerability exists in the upload_bgm_file function within the app/controllers/v1/video.py component, specifically in the File Extension Handler. The flaw allows an attacker to manipulate the 'File' argument to perform an unrestricted file upload. This means that the software does not properly validate or restrict the types or contents of files being uploaded, enabling an attacker to upload potentially malicious files remotely without authentication or user interaction. The vulnerability can be exploited over the network (AV:N) with low attack complexity (AC:L), no privileges required (PR:L indicates low privileges but not none), and no user interaction needed (UI:N). The impact vector indicates low confidentiality, integrity, and availability impacts individually, but combined they can lead to significant risk, such as remote code execution or system compromise if the uploaded files are executed or processed improperly. No known exploits are currently reported in the wild, and no patches or mitigations have been linked yet. The vulnerability is notable because unrestricted file upload is a common attack vector that can lead to server compromise, data breaches, or service disruption if exploited successfully. The lack of restrictions on file types or content in the upload_bgm_file function suggests insufficient input validation and sanitization controls in the application code.
Potential Impact
For European organizations using MoneyPrinterTurbo, this vulnerability poses a tangible risk of unauthorized remote code execution or system compromise. Attackers could upload malicious scripts or executables, potentially gaining persistent access to internal systems, exfiltrating sensitive financial or operational data, or disrupting services. Given that MoneyPrinterTurbo appears to be a financial or transactional software (implied by its name), exploitation could lead to financial fraud, data leakage, or reputational damage. The medium severity score reflects that while exploitation is feasible remotely without user interaction, the impact on confidentiality, integrity, and availability is rated low individually but could escalate depending on the deployment context. Organizations in Europe with deployments of affected versions may face compliance risks under GDPR if personal data is compromised. Additionally, the financial sector is a frequent target of cyberattacks, increasing the likelihood that threat actors might prioritize exploiting this vulnerability once publicized. The absence of known exploits in the wild currently provides a window for proactive mitigation before widespread exploitation occurs.
Mitigation Recommendations
European organizations should immediately inventory their deployments of MoneyPrinterTurbo to identify affected versions (1.2.0 through 1.2.6). Until an official patch is released, organizations should implement compensating controls such as restricting file upload functionality via network segmentation or application-layer firewalls to trusted users only. Input validation and file type restrictions should be enforced at the web server or reverse proxy level, blocking executable or script file types commonly used in attacks (e.g., .php, .exe, .js). Monitoring upload directories for anomalous files and implementing file integrity monitoring can help detect exploitation attempts. Additionally, organizations should review application logs for suspicious upload activity and prepare incident response plans. Once a patch becomes available, prompt application of the update is critical. If feasible, disabling or limiting the upload_bgm_file functionality temporarily can reduce exposure. Employing web application firewalls (WAFs) with custom rules to detect and block malicious upload patterns can also mitigate risk. Finally, educating developers and administrators on secure file upload practices will help prevent similar vulnerabilities in the future.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-19T11:19:51.559Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 687d012da83201eaac02df49
Added to database: 7/20/2025, 2:46:05 PM
Last enriched: 7/28/2025, 1:05:09 AM
Last updated: 8/25/2025, 5:25:18 AM
Views: 25
Related Threats
CVE-2025-9716: Cross Site Scripting in O2OA
MediumCVE-2025-5083: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in milmor Amministrazione Trasparente
MediumCVE-2025-47696: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Solwin Blog Designer PRO
HighCVE-2025-31100: CWE-434 Unrestricted Upload of File with Dangerous Type in Mojoomla School Management
CriticalCVE-2025-9715: Cross Site Scripting in O2OA
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.