CVE-2025-0582
Published: 20 January 2025
Description
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Security Summary
CVE-2025-0582 is a vulnerability classified as critical in the itsourcecode Farm Management System up to version 1.0, affecting unknown code in the /add-pig.php file. It enables unrestricted upload through manipulation of the pigphoto argument and can be exploited remotely, as published on 2025-01-20. The issue is scored at CVSS 4.7 (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L) and maps to CWEs 284 (Improper Access Control) and 434 (Unrestricted Upload of File with Dangerous Type).
Attackers with high privileges (PR:H) can exploit this over the network with low complexity and no user interaction required. Successful exploitation allows limited impacts, including low-level disclosure or modification of data (C:L/I:L) and minor denial of service (A:L), without scope change.
Advisories and further details are documented in references such as the GitHub issue at https://github.com/yunhai666/cve/issues/2, the vendor site at https://itsourcecode.com/, and VulDB entries at https://vuldb.com/?ctiid.292600, https://vuldb.com/?id.292600, and https://vuldb.com/?submit.484909, where mitigation guidance may be available.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Unrestricted file upload vulnerability in public-facing web application (/add-pig.php) allows remote exploitation for initial access (T1190) and uploading/executing web shells containing arbitrary PHP code for code execution and persistence (T1100, T1505.003).