Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9847: Unrestricted Upload in ScriptAndTools Real Estate Management System

0
Medium
VulnerabilityCVE-2025-9847cvecve-2025-9847
Published: Wed Sep 03 2025 (09/03/2025, 01:02:07 UTC)
Source: CVE Database V5
Vendor/Project: ScriptAndTools
Product: Real Estate Management System

Description

A weakness has been identified in ScriptAndTools Real Estate Management System 1.0. Impacted is an unknown function of the file register.php. This manipulation of the argument uimage causes unrestricted upload. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 09/10/2025, 04:44:43 UTC

Technical Analysis

CVE-2025-9847 is a vulnerability identified in version 1.0 of the ScriptAndTools Real Estate Management System, specifically related to the file register.php. The vulnerability arises from improper handling of the 'uimage' argument, which allows an attacker to perform an unrestricted file upload. This means that an attacker can upload arbitrary files, potentially including malicious scripts or executables, without proper validation or restrictions. The vulnerability is remotely exploitable without requiring user interaction or authentication, increasing the risk of exploitation. The CVSS 4.0 base score is 5.3 (medium severity), reflecting that the attack vector is network-based, with low complexity and no privileges or user interaction required. The impact on confidentiality, integrity, and availability is low individually but combined can lead to significant risks such as remote code execution or system compromise if the uploaded files are executed by the server. Although no known exploits are currently observed in the wild, the exploit code has been made publicly available, increasing the likelihood of future attacks. The lack of patches or mitigation guidance from the vendor at this time further exacerbates the risk. This vulnerability is critical for organizations using this specific real estate management software, as it could allow attackers to gain unauthorized access, manipulate data, or disrupt services by leveraging the unrestricted upload flaw.

Potential Impact

For European organizations using ScriptAndTools Real Estate Management System version 1.0, this vulnerability poses a tangible risk to operational security and data integrity. Real estate management systems typically handle sensitive client data, including personal identification, financial information, and property details. Exploitation could lead to unauthorized data disclosure, data tampering, or service disruption. The ability to upload arbitrary files remotely without authentication could allow attackers to deploy web shells or malware, leading to full system compromise, lateral movement within the network, or ransomware deployment. This could result in regulatory non-compliance, especially under GDPR, causing legal and financial repercussions. Additionally, reputational damage could be severe given the sensitive nature of real estate transactions. The medium CVSS score underestimates the potential cascading effects if attackers leverage this vulnerability as an initial foothold. European organizations with limited cybersecurity resources or delayed patch management processes are particularly vulnerable.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the register.php endpoint via network controls such as web application firewalls (WAFs) or IP whitelisting to limit exposure. 2. Implement strict input validation and file type restrictions on the 'uimage' parameter to prevent uploading executable or script files. 3. Monitor server directories for unauthorized file uploads and implement integrity checks to detect anomalies. 4. Employ runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions to detect and block suspicious activities related to file uploads. 5. If possible, disable or remove the vulnerable upload functionality until a vendor patch is available. 6. Conduct regular security audits and penetration testing focused on file upload mechanisms. 7. Maintain comprehensive logging and alerting for upload attempts to enable rapid incident response. 8. Engage with the vendor for updates or patches and apply them promptly once released. 9. Educate IT and security teams about this vulnerability to ensure awareness and readiness to respond to potential exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-02T14:10:28.394Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b79e44ad5a09ad00eb0926

Added to database: 9/3/2025, 1:47:48 AM

Last enriched: 9/10/2025, 4:44:43 AM

Last updated: 10/18/2025, 10:07:27 PM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats