Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 11 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Mon, 05 Jan 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
E-point e-point Cms
|
|
| CPEs | cpe:2.3:a:e-point:e-point_cms:eagle.gsam-1169.1:*:*:*:*:*:*:* | |
| Vendors & Products |
E-point e-point Cms
|
Mon, 08 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-434 | |
| Metrics |
cvssV3_1
|
Fri, 05 Dec 2025 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
E-point
E-point cms |
|
| Vendors & Products |
E-point
E-point cms |
Thu, 04 Dec 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The E-POINT CMS eagle.gsam-1169.1 file upload feature improperly handles nested archive files. An attacker can upload a nested ZIP (a ZIP containing another ZIP) where the inner archive contains an executable file (e.g. webshell.php). When the application extracts the uploaded archives, the executable may be extracted into a web-accessible directory. This can lead to remote code execution (RCE), data disclosure, account compromise, or further system compromise depending on the web server/process privileges. The issue arises from insufficient validation of archive contents and inadequate restrictions on extraction targets. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-03-11T20:05:31.958Z
Reserved: 2025-11-18T00:00:00.000Z
Link: CVE-2025-65806
Updated: 2025-12-08T15:37:23.867Z
Status : Modified
Published: 2025-12-04T20:16:19.563
Modified: 2026-03-11T21:16:11.257
Link: CVE-2025-65806
No data.
OpenCVE Enrichment
Updated: 2025-12-05T10:52:11Z