Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-6210 | A vulnerability classified as critical has been found in ChestnutCMS up to 1.5.2. This affects the function uploadFile of the file /dev-api/cms/file/upload. The manipulation of the argument file leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. |
Mon, 12 May 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
1000mz
1000mz chestnutcms |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:1000mz:chestnutcms:1.5.2:*:*:*:*:*:*:* | |
| Vendors & Products |
1000mz
1000mz chestnutcms |
Thu, 06 Mar 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 06 Mar 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability classified as critical has been found in ChestnutCMS up to 1.5.2. This affects the function uploadFile of the file /dev-api/cms/file/upload. The manipulation of the argument file leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | |
| Title | ChestnutCMS upload uploadFile unrestricted upload | |
| Weaknesses | CWE-284 CWE-434 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-03-06T16:28:30.900Z
Reserved: 2025-03-06T08:55:21.210Z
Link: CVE-2025-2031
Updated: 2025-03-06T16:28:25.710Z
Status : Analyzed
Published: 2025-03-06T16:15:55.727
Modified: 2025-05-12T20:56:38.933
Link: CVE-2025-2031
No data.
OpenCVE Enrichment
No data.
EUVD