CVE-2025-9800
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-01

Last updated on: 2026-04-29

Assigner: VulDB

Description
A weakness has been identified in SimStudioAI sim up to ed9b9ad83f1a7c61f4392787fb51837d34eeb0af. Affected by this issue is the function Import of the file apps/sim/app/api/files/upload/route.ts of the component HTML File Parser. Executing manipulation of the argument File can lead to unrestricted upload. The attack may be launched remotely. The exploit has been made available to the public and could be exploited. This product operates on a rolling release basis, ensuring continuous delivery. Consequently, there are no version details for either affected or updated releases. This patch is called 45372aece5e05e04b417442417416a52e90ba174. A patch should be applied to remediate this issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-01
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-09-02
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
sim sim to 0.3.40 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-434 The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Import function of the HTML File Parser component in SimStudioAI. It allows an attacker to manipulate the File argument to perform an unrestricted upload, potentially enabling remote exploitation. This means unauthorized files could be uploaded to the system without proper restrictions.


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized file uploads, which may allow attackers to upload malicious files, potentially compromising the system's integrity, confidentiality, and availability. This could result in data breaches, system compromise, or further exploitation.


What immediate steps should I take to mitigate this vulnerability?

Apply the patch identified as 45372aece5e05e04b417442417416a52e90ba174 to remediate the issue. Since the product operates on a rolling release basis, ensure your system is updated to the latest version that includes this patch.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart