Cyber Posture

CVE-2025-0364

CriticalPublic PoC

Published: 04 February 2025

Published
04 February 2025
Modified
29 September 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.2233 95.8th percentile
Risk Priority 33 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may backdoor web servers with web shells to establish persistent access to systems.

Security Summary

CVE-2025-0364 affects BigAntSoft BigAnt Server versions up to and including 5.6.06, enabling unauthenticated remote code execution through an exposed account registration mechanism. The vulnerability stems from the default SaaS registration feature, which allows attackers to create administrative accounts without authentication. It has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-288 (Authentication Bypass Using an Alternate Path or Channel). Published on 2025-02-04, this flaw permits escalation to full server compromise.

An unauthenticated remote attacker can exploit this by registering a new administrative user via the publicly accessible SaaS endpoint. With admin privileges, the attacker then uses the "Cloud Storage Addin" to upload and execute arbitrary PHP code, achieving unauthenticated remote code execution on the server. No user interaction or privileges are required, making it highly exploitable over the network with low complexity.

Advisories detailing mitigation are available from VulnCheck at https://vulncheck.com/advisories/big-ant-upload-rce, along with a proof-of-concept at https://github.com/vulncheck-oss/cve-2025-0364. Security practitioners should consult these resources for patch information, workarounds, or configuration changes to disable the exposed registration mechanism.

Details

CWE(s)
CWE-288

Affected Products

bigantsoft
bigant server
≤ 5.6.06

MITRE ATT&CK Enterprise Techniques

T1136.001 Local Account Persistence
Adversaries may create a local account to maintain access to victim systems.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

Vulnerability enables unauthenticated creation of local admin accounts (T1136.001), exploitation of public-facing chat server application (T1190), and deployment/execution of web shells via arbitrary PHP file upload in Cloud Storage Addin (T1505.003).

References