Cyber Posture

CVE-2025-60947

High

Published: 23 March 2026

Published
23 March 2026
Modified
25 March 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0031 54.5th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Census CSWeb 8.0.1 allows arbitrary file upload. A remote, authenticated attacker could upload a malicious file, possibly leading to remote code execution. Fixed in 8.1.0 alpha.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates unrestricted file uploads by enforcing validation of file types, extensions, and content at upload points to prevent dangerous files from being accepted.

prevent

Requires timely patching of the specific arbitrary file upload flaw as fixed in Census CSWeb 8.1.0 to eliminate the vulnerability.

preventdetect

Deploys malicious code protection at system entry points like file uploads to scan and block executable or dangerous files leading to RCE.

Security SummaryAI

CVE-2025-60947 is an arbitrary file upload vulnerability affecting Census CSWeb version 8.0.1. Published on 2026-03-23, it is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). The flaw enables a remote, authenticated attacker to upload a malicious file, potentially resulting in remote code execution.

A remote attacker with low-privilege authenticated access can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, allowing the attacker to execute arbitrary code on the server by uploading and triggering a malicious file.

Mitigation is available in Census CSWeb 8.1.0 alpha, as indicated by the patching commit at https://github.com/csprousers/csweb/commit/eba0b59a243390a1a4f9524cce6dbc0314bf0d91. Additional resources include a CISA advisory at https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2026/va-26-082-01.json, the official CVE record at https://www.cve.org/CVERecord?id=CVE-2025-60947, and an exploits repository at https://github.com/hx381/cspro-exploits. Security practitioners should upgrade to the fixed version and review access controls for file upload functionalities.

Details

CWE(s)

Affected Products

csprousers
csweb
8.0.1

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Arbitrary file upload in public-facing web application enables exploitation for initial access (T1190) and privilege escalation from low-priv auth to RCE (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References