CVE-2025-29401
Published: 19 March 2025
Description
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Security Summary
CVE-2025-29401 is an arbitrary file upload vulnerability in the /views/plugin.php component of emlog pro version 2.5.7. This flaw allows attackers to upload crafted PHP files, resulting in arbitrary code execution on the server. The vulnerability carries a CVSS v3.1 base score of 9.8, reflecting its critical severity due to network accessibility, low attack complexity, and no requirements for privileges or user interaction.
Remote, unauthenticated attackers can exploit this vulnerability over the network by sending a malicious request to the affected endpoint. Successful exploitation grants attackers the ability to execute arbitrary code with the privileges of the web server process, potentially leading to full server compromise, including high-impact confidentiality breaches, integrity modifications, and availability disruptions.
References for this CVE point to GitHub repositories hosting documentation on emlog pro 2.5.7, specifically a file titled "emlog pro2.5.7-getshell.md," which details the exploit technique for achieving remote code execution. No official patch or mitigation guidance is specified in the provided information.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Arbitrary file upload in public-facing web application (/views/plugin.php) enables exploitation of public-facing application (T1190) and deployment/execution of web shells via crafted PHP files (T1100, T1505.003).