A vulnerability classified as critical has been found in ChestnutCMS up to 1.5.2. This affects the function uploadFile of the file /dev-api/cms/file/upload. The manipulation of the argument file leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
History

Mon, 12 May 2025 21:15:00 +0000

Type Values Removed Values Added
First Time appeared 1000mz
1000mz chestnutcms
Weaknesses CWE-79
CPEs cpe:2.3:a:1000mz:chestnutcms:1.5.2:*:*:*:*:*:*:*
Vendors & Products 1000mz
1000mz chestnutcms

Thu, 06 Mar 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 06 Mar 2025 16:15:00 +0000

Type Values Removed Values Added
Description A vulnerability classified as critical has been found in ChestnutCMS up to 1.5.2. This affects the function uploadFile of the file /dev-api/cms/file/upload. The manipulation of the argument file leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Title ChestnutCMS upload uploadFile unrestricted upload
Weaknesses CWE-284
CWE-434
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2025-03-06T16:00:09.784Z

Updated: 2025-03-06T16:28:30.900Z

Reserved: 2025-03-06T08:55:21.210Z

Link: CVE-2025-2031

cve-icon Vulnrichment

Updated: 2025-03-06T16:28:25.710Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-06T16:15:55.727

Modified: 2025-05-12T20:56:38.933

Link: CVE-2025-2031

cve-icon Redhat

No data.