CVE-2025-6001
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-06-11

Last updated on: 2025-06-12

Assigner: Black Lantern Security

Description
A Cross-Site Request Forgery (CSRF) vulnerability exists in the product image upload function of VirtueMart that bypasses the CSRF protection token. An attacker is able to craft a special CSRF request which will allow unrestricted file upload into the VirtueMart media manager.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-11
Last Modified
2025-06-12
Generated
2026-05-07
AI Q&A
2025-06-11
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-352 The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-6001 is a Cross-Site Request Forgery (CSRF) vulnerability in the VirtueMart product image upload function that bypasses the CSRF protection token. This flaw allows an attacker to craft a special CSRF request that enables unrestricted file upload into the VirtueMart media manager without the user's knowledge. When combined with another vulnerability (CVE-2025-6002), it allows unauthenticated attackers to upload malicious files and potentially execute remote code on the server. [1]


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized file uploads on a server running VirtueMart, allowing attackers to upload malicious files such as web shells. This can result in remote code execution, giving attackers control over the affected server. The attack can be performed without the victim's knowledge by tricking an authenticated user into clicking a malicious link, potentially compromising the entire website and its data. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves monitoring for unauthorized or suspicious file uploads to the VirtueMart media manager, especially files with unusual extensions or disguised web shells (e.g., PHP code in .jpg files). Network detection can include inspecting HTTP requests for CSRF attack patterns targeting the media upload function. Specific commands are not provided in the resources, but administrators should check web server logs for POST requests to the media upload endpoint and look for unexpected file uploads or .htaccess files that alter server behavior. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include applying the patch released on May 9, 2025, which addresses the CSRF vulnerability in the VirtueMart media upload function. Additionally, restrict file upload types and implement server-side validation to prevent arbitrary file uploads. Ensure .htaccess or equivalent server configurations prevent execution of uploaded files, especially those disguised as images. Monitoring and restricting user privileges to upload files can also reduce risk. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart