Skip to main content

CVE-2025-8775: Unrestricted Upload in Qiyuesuo Eelectronic Signature Platform

Medium
VulnerabilityCVE-2025-8775cvecve-2025-8775
Published: Sat Aug 09 2025 (08/09/2025, 21:02:07 UTC)
Source: CVE Database V5
Vendor/Project: Qiyuesuo
Product: Eelectronic Signature Platform

Description

A vulnerability was found in Qiyuesuo Eelectronic Signature Platform up to 4.34 and classified as critical. Affected by this issue is the function execute of the file /api/code/upload of the component Scheduled Task Handler. The manipulation of the argument File leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 08/09/2025, 21:32:47 UTC

Technical Analysis

CVE-2025-8775 is a medium-severity vulnerability affecting the Qiyuesuo Electronic Signature Platform versions up to 4.34. The vulnerability resides in the Scheduled Task Handler component, specifically in the /api/code/upload endpoint's execute function. It allows an attacker to perform an unrestricted file upload by manipulating the 'File' argument. This flaw can be exploited remotely without requiring user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability's exploitation could enable attackers to upload arbitrary files, potentially leading to remote code execution, unauthorized access, or system compromise depending on the server's configuration and the nature of the uploaded files. The vendor has not responded to disclosure attempts, and no patches or mitigations have been officially released. While no known exploits are currently in the wild, the public disclosure of the exploit increases the risk of exploitation. The CVSS score of 5.3 reflects a medium severity, balancing the ease of exploitation with the limited scope of impact due to the requirement of low privileges (PR:L) and the lack of user interaction or scope change. The vulnerability does not involve confidentiality, integrity, or availability impacts at a high level but poses a significant risk if leveraged for further attacks.

Potential Impact

For European organizations using the Qiyuesuo Electronic Signature Platform, this vulnerability could have serious implications. Electronic signature platforms are critical for legal, financial, and administrative processes, and compromise could lead to unauthorized document manipulation, fraud, or leakage of sensitive information. The ability to upload arbitrary files remotely could allow attackers to deploy web shells or malware, leading to broader network compromise. This risk is heightened in sectors with stringent regulatory requirements such as GDPR, where data breaches can result in heavy fines and reputational damage. Additionally, organizations relying on electronic signatures for contract validation or compliance may face operational disruptions or legal challenges if the platform integrity is compromised. Given the vendor's lack of response and absence of patches, European entities must assume a higher risk posture and prepare for potential exploitation attempts.

Mitigation Recommendations

1. Immediate mitigation should involve restricting access to the /api/code/upload endpoint via network controls such as firewalls or web application firewalls (WAFs) to limit exposure to trusted IP addresses only. 2. Implement strict input validation and file type restrictions at the application or proxy level to prevent unauthorized file types from being uploaded. 3. Monitor logs for unusual upload activity or access patterns to detect potential exploitation attempts early. 4. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous file upload behavior. 5. If possible, isolate the affected platform in a segmented network zone to limit lateral movement in case of compromise. 6. Regularly back up critical data and ensure incident response plans include scenarios involving this platform. 7. Engage with the vendor or community to seek updates or unofficial patches and consider alternative solutions if no vendor support is forthcoming. 8. Conduct penetration testing focused on file upload functionalities to identify and remediate similar weaknesses proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-08T20:26:31.112Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6897bb0dad5a09ad000e951b

Added to database: 8/9/2025, 9:18:05 PM

Last enriched: 8/9/2025, 9:32:47 PM

Last updated: 8/10/2025, 12:12:29 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats