Skip to main content

CVE-2025-9795: Unrestricted Upload in xujeff tianti 天梯

Medium
VulnerabilityCVE-2025-9795cvecve-2025-9795
Published: Mon Sep 01 2025 (09/01/2025, 21:02:06 UTC)
Source: CVE Database V5
Vendor/Project: xujeff
Product: tianti 天梯

Description

A vulnerability has been found in xujeff tianti 天梯 up to 2.3. The impacted element is the function ajaxUploadFile of the file src/main/java/com/jeff/tianti/controller/UploadController.java. The manipulation of the argument upfile leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 09/01/2025, 21:32:44 UTC

Technical Analysis

CVE-2025-9795 is a medium-severity vulnerability affecting the xujeff tianti 天梯 software versions 2.0 through 2.3. The vulnerability resides in the ajaxUploadFile function within the UploadController.java source file. Specifically, the argument 'upfile' is improperly handled, allowing an attacker to perform an unrestricted file upload. This means that an attacker can remotely upload arbitrary files without authentication or user interaction, potentially leading to remote code execution or other malicious activities depending on the file type uploaded and the server configuration. The vulnerability is exploitable over the network (AV:N) with low attack complexity (AC:L), no privileges required (PR:L, indicating some limited privileges may be needed), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is low individually but combined could lead to significant compromise if exploited. The vulnerability has been publicly disclosed, but no known exploits are currently observed in the wild. The CVSS 4.0 score is 5.3, reflecting a medium severity level. The lack of patch links suggests that a fix may not yet be available or publicly released. Given the unrestricted upload capability, attackers could upload web shells, malware, or other malicious payloads, potentially leading to server compromise, data leakage, or service disruption.

Potential Impact

For European organizations using xujeff tianti 天梯 versions 2.0 to 2.3, this vulnerability poses a tangible risk of unauthorized system compromise. The ability to upload arbitrary files remotely without authentication could allow attackers to deploy web shells or malware, leading to data breaches, defacement, or disruption of services. Organizations in sectors with sensitive data or critical infrastructure could face regulatory repercussions under GDPR if personal data is exposed. Additionally, the compromise of internal systems could facilitate lateral movement within networks, increasing the scope of impact. The medium severity rating indicates that while the vulnerability is not trivially exploitable to cause immediate critical damage, it still represents a significant risk that must be addressed promptly to prevent exploitation. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially given public disclosure.

Mitigation Recommendations

European organizations should immediately audit their deployments of xujeff tianti 天梯 to identify affected versions (2.0 to 2.3). Until an official patch is released, organizations should implement strict network-level controls to restrict access to the upload functionality, such as IP whitelisting or VPN-only access. Web application firewalls (WAFs) should be configured to detect and block suspicious file upload attempts, including filtering by file type, size, and content inspection to prevent executable or script files from being uploaded. Additionally, disabling or restricting the ajaxUploadFile endpoint if not required can reduce the attack surface. Monitoring and logging upload activities should be enhanced to detect anomalous behavior. Organizations should also prepare to apply patches promptly once available and conduct thorough security assessments to detect any signs of compromise. Employing runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions can help identify exploitation attempts in real time.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-01T11:38:37.454Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b60d77ad5a09ad00d3ee9c

Added to database: 9/1/2025, 9:17:43 PM

Last enriched: 9/1/2025, 9:32:44 PM

Last updated: 9/2/2025, 1:04:55 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats