CVE-2025-7114
Analyzed Analyzed - Analysis Complete
BaseFortify

Publication date: 2025-07-07

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was found in SimStudioAI sim up to 37786d371e17d35e0764e1b5cd519d873d90d97b. It has been declared as critical. Affected by this vulnerability is the function POST of the file apps/sim/app/api/files/upload/route.ts of the component Session Handler. The manipulation of the argument Request leads to missing authentication. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-07
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-07-07
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
sim sim to 0.2.1 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-434 The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
CWE-306 The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
CWE-287 When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-7114 is an unauthorized file upload vulnerability in the SimStudioAI application. The issue exists in the POST function of the API endpoint `api/files/upload` where there is a missing authentication check. This means that anyone, without verifying their identity, can upload an unlimited number of files to the server. The lack of authentication allows attackers to bypass security controls and exploit this endpoint remotely. [1, 2, 3]


How can this vulnerability impact me? :

This vulnerability can be exploited remotely by attackers to upload unlimited files to the server, which can fill up the server's storage space. This can lead to denial of service (DoS) conditions or other operational disruptions, affecting the availability and integrity of the system. Since there is no authentication, unauthorized users can perform these actions without restriction. [1, 2, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for unauthorized POST requests to the API endpoint `/api/files/upload` that do not require authentication. You can use network traffic inspection tools like curl or wget to test if the endpoint accepts file uploads without authentication. For example, a command to test this could be: curl -X POST -F "[email protected]" http://<target-server>/api/files/upload If the file uploads successfully without authentication, the vulnerability is present. Additionally, monitoring server logs for unexpected file uploads or unusual storage usage can help detect exploitation attempts. [3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the vulnerable API endpoint by implementing authentication checks before allowing file uploads. Since no official patch or vendor response is available, you should consider applying an authentication check similar to the following in the POST handler: ```javascript const session = await getSession(); if (!session?.user?.id) { return NextResponse.json({ error: 'Unauthorized' }, { status: 401 }); } ``` Alternatively, you can temporarily disable or restrict access to the `/api/files/upload` endpoint to trusted users only. Monitoring and limiting file upload sizes and counts can also help reduce impact. If possible, consider replacing the affected component with a secure alternative. [2, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart