A vulnerability has been found in Zorlan SkyCaiji 2.9 and classified as critical. This vulnerability affects the function fileAction of the file vendor/skycaiji/app/admin/controller/Tool.php. The manipulation of the argument save_data leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
History

Thu, 12 Jun 2025 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Skycaiji
Skycaiji skycaiji
CPEs cpe:2.3:a:skycaiji:skycaiji:2.9:*:*:*:*:*:*:*
Vendors & Products Skycaiji
Skycaiji skycaiji

Tue, 04 Mar 2025 03:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 01 Mar 2025 13:45:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in Zorlan SkyCaiji 2.9 and classified as critical. This vulnerability affects the function fileAction of the file vendor/skycaiji/app/admin/controller/Tool.php. The manipulation of the argument save_data leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Title Zorlan SkyCaiji Tool.php fileAction unrestricted upload
Weaknesses CWE-284
CWE-434
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2025-03-01T13:31:04.040Z

Updated: 2025-03-03T20:36:54.749Z

Reserved: 2025-02-28T17:09:17.768Z

Link: CVE-2025-1791

cve-icon Vulnrichment

Updated: 2025-03-03T17:15:40.602Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-01T14:15:34.520

Modified: 2025-06-12T20:26:54.890

Link: CVE-2025-1791

cve-icon Redhat

No data.