CVE-2025-56218
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-17

Last updated on: 2025-10-27

Assigner: MITRE

Description
An arbitrary file upload vulnerability in SigningHub v8.6.8 allows attackers to execute arbitrary code via uploading a crafted PDF file.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-17
Last Modified
2025-10-27
Generated
2026-05-07
AI Q&A
2025-10-17
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
ascertia signinghub to 8.6.8 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-434 The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-56218 is an arbitrary file upload vulnerability in SigningHub versions prior to 8.6.8. It allows an authenticated remote attacker to upload crafted files (such as Excel files with malicious scripts or phishing URLs) that the application converts into PDFs and forwards to recipients. The PDFs contain attacker-controlled hyperlinks without warnings, which can deceive recipients into executing malicious commands or visiting phishing sites. This happens because the application does not scan uploaded files before processing and forwarding them. [2]


How can this vulnerability impact me? :

This vulnerability can lead to execution of arbitrary code or redirection to phishing websites when recipients click on malicious links in the PDFs generated from uploaded files. This can compromise system security, lead to data breaches, or enable attackers to perform unauthorized actions within the affected environment. [2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection can involve monitoring for unauthorized or suspicious file uploads, especially Excel files that are converted to PDFs. Since the vulnerability involves uploading crafted files, inspecting upload logs for unusual file types or unexpected upload activity is recommended. Additionally, scanning uploaded files for malicious scripts or phishing URLs before processing can help detect exploitation attempts. Specific commands are not provided in the resources. [2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include scanning all uploaded files prior to processing and distribution to detect malicious content. Updating SigningHub to a version later than 8.6.8, where the vulnerability is fixed, is also recommended. Restricting file upload permissions and monitoring for suspicious upload activity can further reduce risk. [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart