CVE-2024-25182
Published: 29 December 2025
Description
givanz VvvebJs 1.7.2 suffers from a File Upload vulnerability via save.php.
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the unrestricted file upload vulnerability in VvvebJs 1.7.2 save.php by identifying, reporting, and correcting the specific flaw.
Validates file inputs to the save.php endpoint to ensure only safe types and content are accepted, preventing CWE-434 unrestricted uploads of dangerous files.
Detects and eradicates malicious code in uploaded files via protection mechanisms at system entry points, mitigating high-impact exploitation of the vulnerability.
Security SummaryAI
CVE-2024-25182 is a file upload vulnerability in givanz VvvebJs version 1.7.2, exploitable via the save.php component. Published on 2025-12-29, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), classifying it as critical severity and mapping to CWE-434 (Unrestricted Upload of File with Dangerous Type).
Unauthenticated remote attackers require only network access and can exploit the issue with low attack complexity and no user interaction. Exploitation enables high-impact effects on confidentiality, integrity, and availability, allowing attackers to upload arbitrary files through the vulnerable endpoint.
Mitigation details are provided in the referenced advisory at https://gist.github.com/joaoviictorti/ff6220d8ed6df77a0420f4413a1d9b8d.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated arbitrary file upload vulnerability in a public-facing web application (VvvebJs save.php) directly enables T1190 (Exploit Public-Facing Application) and facilitates uploading web shells for persistence/execution (T1100).