Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8120: CWE-434 Unrestricted Upload of File with Dangerous Type in Polska Akademia Dostępności PAD CMS

0
Critical
VulnerabilityCVE-2025-8120cvecve-2025-8120cwe-434
Published: Tue Sep 30 2025 (09/30/2025, 10:05:03 UTC)
Source: CVE Database V5
Vendor/Project: Polska Akademia Dostępności
Product: PAD CMS

Description

CVE-2025-8120 is a critical vulnerability in the Polska Akademia Dostępności PAD CMS that allows unauthenticated remote attackers to upload and execute arbitrary files due to improper validation of upload permissions. This unrestricted file upload flaw affects all three templates of PAD CMS (www, bip, ww+bip) and can lead to remote code execution without any authentication or user interaction. The product is end-of-life, and no patches will be issued, increasing the risk for organizations still using it. The vulnerability has a maximum CVSS score of 10, reflecting its severe impact on confidentiality, integrity, and availability. Although no exploits are currently known in the wild, the ease of exploitation and critical impact make this a significant threat. European organizations using PAD CMS, especially in Poland and neighboring countries, are at highest risk. Immediate mitigation involves discontinuing use of PAD CMS or isolating affected systems, implementing strict network segmentation, and monitoring for suspicious file uploads or execution attempts.

AI-Powered Analysis

AILast updated: 10/07/2025, 11:30:23 UTC

Technical Analysis

CVE-2025-8120 is a critical security vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) found in the Polska Akademia Dostępności (PAD) CMS. The root cause is a client-controlled permission check parameter in the photo upload functionality, which fails to properly restrict file types and extensions. This flaw allows an unauthenticated remote attacker to upload files of any type, including executable scripts or binaries, without any validation or restriction. Once uploaded, these files can be executed on the server, resulting in remote code execution (RCE). The vulnerability affects all three templates of PAD CMS: www, bip, and ww+bip. The product is End-Of-Life, and the vendor will not provide patches or updates to remediate this issue. The CVSS v4.0 score is 10.0, indicating a critical severity with network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. The vulnerability was reserved in July 2025 and published in September 2025. No known exploits have been reported in the wild yet, but the combination of no authentication needed and direct RCE potential makes this a highly exploitable and dangerous vulnerability.

Potential Impact

The impact of CVE-2025-8120 on European organizations is significant, particularly for those still operating PAD CMS for their web content management. Successful exploitation allows attackers to execute arbitrary code remotely, potentially leading to full system compromise, data theft, defacement, or use of the compromised server as a pivot point for further attacks. Confidentiality is at risk due to possible data exfiltration, integrity is compromised as attackers can alter content or system files, and availability can be disrupted by malicious payloads or ransomware deployment. Since PAD CMS is used primarily in Poland and possibly in other Central and Eastern European countries, organizations in these regions face the highest risk. The lack of vendor support and patches means organizations must rely on compensating controls or migration to secure platforms. The vulnerability also poses a reputational risk and potential regulatory compliance issues under GDPR if personal data is compromised.

Mitigation Recommendations

Given the product is End-Of-Life and no patches will be released, the primary mitigation is to immediately discontinue use of PAD CMS and migrate to a supported and secure CMS platform. If migration is not immediately feasible, organizations should isolate PAD CMS servers within segmented network zones with strict access controls to limit exposure. Implement web application firewalls (WAFs) with custom rules to detect and block suspicious file uploads or execution attempts. Disable or restrict the upload photo functionality if possible. Conduct thorough monitoring and logging of all file upload activities and server execution logs to detect potential exploitation attempts. Regularly audit the CMS environment for unauthorized files or changes. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation patterns related to file upload vulnerabilities. Finally, educate administrators and users about the risks and signs of compromise related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERT-PL
Date Reserved
2025-07-24T14:25:08.034Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68dbac586e3c400c0ffa5e05

Added to database: 9/30/2025, 10:09:28 AM

Last enriched: 10/7/2025, 11:30:23 AM

Last updated: 11/14/2025, 5:24:03 AM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats