CVE-2025-12301
BaseFortify
Publication date: 2025-10-27
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| fabian | simple_food_ordering_system | 1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-434 | The product allows the upload or transfer of dangerous file types that are automatically processed within its environment. |
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-12301 is an unrestricted file upload vulnerability in the Simple Food Ordering System version 1.0, specifically in the /editproduct.php file. The vulnerability occurs because the system does not properly validate the uploaded files' type, content, extension, or size, allowing attackers to upload malicious files such as webshells or executable scripts. These files can be uploaded remotely without authentication, enabling attackers to execute arbitrary code on the server and compromise the system. [1, 2, 3]
How can this vulnerability impact me? :
Exploiting this vulnerability can lead to unauthorized server access, remote code execution, full system compromise, leakage of sensitive data, and potential disruption of services. Attackers can upload malicious files that run arbitrary commands on the server, which threatens the confidentiality, integrity, and availability of the affected system. [1, 2, 3]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by searching for the presence of the vulnerable file upload endpoint, specifically "editproduct.php". One method is to use Google hacking techniques with the query "inurl:editproduct.php" to identify potentially vulnerable targets. Additionally, monitoring web server logs for unusual file upload activity or requests containing suspicious file extensions (e.g., .php) to the "photo" argument can help detect exploitation attempts. Since the vulnerability allows uploading of malicious files such as webshells, scanning the web-accessible upload directories for unexpected PHP or executable files is recommended. Commands to assist detection include: 1) Using curl or wget to test file upload functionality manually, 2) Using find or grep on the server to locate suspicious files, e.g., `find /path/to/uploads -name '*.php'` or `grep -r 'eval($_GET' /path/to/uploads`, 3) Checking web server access logs for POST requests to "editproduct.php" with file uploads. However, no specific detection commands are provided in the resources. [1, 3]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include: 1) Replacing the affected product with an alternative as no known countermeasures currently exist, 2) Implementing strict server-side validation of uploaded files by whitelisting allowed file extensions and MIME types, 3) Verifying actual file content using magic bytes or file signature checks to prevent spoofing, 4) Renaming uploaded files with randomized filenames and removing special characters, 5) Storing uploaded files outside the web root or in isolated directories protected by restrictive .htaccess rules, 6) Applying appropriate file permissions (e.g., 644 for files, 755 for directories), 7) Scanning uploaded files for malicious content using antivirus tools, 8) Enforcing file size and dimension limits to prevent resource exhaustion or denial-of-service, 9) Adding security headers such as Content-Disposition: attachment and correct Content-Type, and 10) Keeping server components and libraries up to date and regularly auditing the upload functionality. These steps are critical to prevent exploitation and protect system security and data integrity. [1, 3, 2]