CVE-2025-8526
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-04

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was found in Exrick xboot up to 3.3.4. It has been declared as critical. This vulnerability affects the function Upload of the file xboot-fast/src/main/java/cn/exrick/xboot/modules/base/controller/common/UploadController.java. The manipulation of the argument File leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-04
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-08-04
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
exrick xboot to 3.3.4 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-434 The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-8526 is a critical vulnerability in Exrick xboot versions up to 3.3.4, specifically in the file upload endpoint "/xboot/upload/file". The vulnerability arises because the system allows unrestricted uploading of files with arbitrary and potentially dangerous extensions without proper validation or sanitization. Attackers can upload malicious files, such as those containing JavaScript, which can lead to Stored Cross-Site Scripting (XSS) attacks or even Remote Code Execution (RCE) on the server. This happens because the uploaded files are renamed but their extensions and content are not filtered, and then stored in cloud storage, making it possible for attackers to execute malicious code remotely. [1, 3]


How can this vulnerability impact me? :

This vulnerability can have serious impacts including compromise of the confidentiality, integrity, and availability of the affected system. Attackers can remotely upload malicious files that may execute arbitrary code on the server (Remote Code Execution) or inject malicious scripts that run in users' browsers (Stored Cross-Site Scripting). This can lead to unauthorized access, data theft, phishing attacks, credential theft, and potentially full system compromise. Because the exploit is publicly available and easy to execute, the risk of attack is significant. [1, 2, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring and testing the file upload endpoint "/xboot/upload/file" for unrestricted file uploads. You can attempt to upload files with arbitrary or dangerous extensions (e.g., .html with embedded scripts) to see if the system accepts them without validation. Network monitoring tools can be used to inspect POST requests to this endpoint for suspicious file uploads. For example, using curl to test the upload endpoint: curl -X POST -F "[email protected]" http://target/xboot/upload/file. Additionally, inspecting server logs for unusual file uploads or unexpected file types can help detect exploitation attempts. [3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include disabling or restricting access to the vulnerable file upload endpoint "/xboot/upload/file" to prevent unauthorized uploads. If possible, replace or upgrade the affected Exrick xboot version to a non-vulnerable version or alternative product, as no known countermeasures or patches are currently available. Implement network-level controls such as web application firewalls (WAF) to block suspicious file uploads and restrict allowed file types. Monitoring and alerting on file upload activities can also help mitigate risk until a permanent fix is applied. [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart