CVE-2025-56218
BaseFortify
Publication date: 2025-10-17
Last updated on: 2025-10-27
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ascertia | signinghub | to 8.6.8 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-434 | The product allows the upload or transfer of dangerous file types that are automatically processed within its environment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-56218 is an arbitrary file upload vulnerability in SigningHub versions prior to 8.6.8. It allows an authenticated remote attacker to upload crafted files (such as Excel files with malicious scripts or phishing URLs) that the application converts into PDFs and forwards to recipients. The PDFs contain attacker-controlled hyperlinks without warnings, which can deceive recipients into executing malicious commands or visiting phishing sites. This happens because the application does not scan uploaded files before processing and forwarding them. [2]
How can this vulnerability impact me? :
This vulnerability can lead to execution of arbitrary code or redirection to phishing websites when recipients click on malicious links in the PDFs generated from uploaded files. This can compromise system security, lead to data breaches, or enable attackers to perform unauthorized actions within the affected environment. [2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection can involve monitoring for unauthorized or suspicious file uploads, especially Excel files that are converted to PDFs. Since the vulnerability involves uploading crafted files, inspecting upload logs for unusual file types or unexpected upload activity is recommended. Additionally, scanning uploaded files for malicious scripts or phishing URLs before processing can help detect exploitation attempts. Specific commands are not provided in the resources. [2]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include scanning all uploaded files prior to processing and distribution to detect malicious content. Updating SigningHub to a version later than 8.6.8, where the vulnerability is fixed, is also recommended. Restricting file upload permissions and monitoring for suspicious upload activity can further reduce risk. [2]