Cyber Posture

CVE-2025-2705

High

Published: 24 March 2025

Published
24 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0011 28.3th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may backdoor web servers with web shells to establish persistent access to systems.

Security Summary

CVE-2025-2705 is a critical vulnerability in Digiwin ERP 5.1, affecting the DoUpload and DoWebUpload functions within the /Api/FileUploadApi.ashx component. The issue arises from manipulation of the File argument, enabling unrestricted file upload. Published on 2025-03-24, it is associated with CWE-284 (Improper Access Control) and CWE-434 (Unrestricted Upload of File with Dangerous Type), with a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).

Remote attackers require no privileges or user interaction to exploit this vulnerability, allowing them to upload arbitrary files over the network with low attack complexity. Exploitation can result in low impacts to confidentiality, integrity, and availability, potentially enabling further compromise depending on the uploaded file type.

Advisories from VulDB and related GitHub reports indicate that the vendor was contacted early regarding disclosure but provided no response. No patches or official mitigations are referenced, and full exploit details have been publicly disclosed, making active use possible.

Details

CWE(s)
CWE-284CWE-434

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

Unrestricted file upload in public-facing web component directly enables T1190 for initial access; facilitates T1505.003 via arbitrary malicious file (e.g., web shell) upload.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References