CVE-2025-67325
Published: 08 January 2026
Description
Unrestricted file upload in the hotel review feature in QloApps versions 1.7.0 and earlier allows remote unauthenticated attackers to achieve remote code execution.
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses unrestricted file uploads by requiring validation of file types, extensions, and content in the hotel review feature to block dangerous files leading to RCE.
Enforces restrictions on file upload inputs such as whitelisting safe types and limiting sizes to prevent unauthenticated attackers from uploading executable files via hotel reviews.
Deploys malicious code protection at system entry points to scan and block uploaded files containing dangerous code that could achieve RCE on the server.
Security SummaryAI
CVE-2025-67325 is an unrestricted file upload vulnerability in the hotel review feature of QloApps versions 1.7.0 and earlier. Classified under CWE-434 (Unrestricted Upload of File with Dangerous Type), it allows remote unauthenticated attackers to achieve remote code execution. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its high impact on confidentiality, integrity, and availability.
Remote unauthenticated attackers can exploit this vulnerability over the network with low attack complexity, requiring no privileges, user interaction, or scope changes. By uploading malicious files through the hotel review functionality, attackers can execute arbitrary code on the server, potentially leading to full system compromise.
Mitigation details and further technical information are available in advisories referenced at https://github.com/Qloapps/QloApps and https://github.com/mr7s3d0/CVE-2025-67325.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is an unrestricted file upload in a public-facing web application (hotel review feature), enabling unauthenticated remote code execution, which directly maps to exploitation of public-facing applications.