Cyber Posture

CVE-2025-60786

HighPublic PoC

Published: 15 December 2025

Published
15 December 2025
Modified
23 December 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0018 39.3th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

A Zip Slip vulnerability in the import a Project component of iceScrum v7.54 Pro On-prem allows attackers to execute arbitrary code via uploading a crafted Zip file.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents Zip Slip exploitation by requiring validation of file paths and contents in uploaded zip archives to block path traversal and arbitrary file writes.

prevent

Addresses the vulnerability at its core by mandating identification, prioritization, and timely remediation of the Zip Slip flaw through vendor patches or updates.

prevent

Mitigates impact by enforcing access control policies that restrict file write operations to authorized paths only, limiting damage from path traversal during project import.

Security SummaryAI

CVE-2025-60786, published on 2025-12-15, is a Zip Slip vulnerability (CWE-22) in the "import a Project" component of iceScrum v7.54 Pro On-prem. This flaw enables attackers to execute arbitrary code by uploading a crafted Zip file during project import operations. The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), reflecting its high severity due to network accessibility, low attack complexity, and significant impacts on confidentiality, integrity, and availability.

Exploitation requires low privileges (PR:L), allowing authenticated users—such as registered project collaborators or low-level admins—to target the component remotely over the network without user interaction. A successful attack involves uploading a maliciously crafted Zip archive, which exploits path traversal to overwrite critical files and trigger arbitrary code execution on the server, potentially leading to full system compromise.

For mitigation guidance, security practitioners should consult the vendor's download page at https://www.icescrum.com/download/ and the detailed analysis at https://zdaylabs.com/CVE-2025-60786.html, which may include patches or workarounds for iceScrum v7.54 Pro On-prem.

Details

CWE(s)

Affected Products

kagilum
icescrum
≤ 7.54

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Zip Slip path traversal in web app project import enables low-priv remote attackers to overwrite files for arbitrary code execution, directly facilitating T1190 (exploit public-facing app) and T1068 (exploitation for privilege escalation).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References