FKIE_CVE-2025-34097
Vulnerability from fkie_nvd - Published: 2025-07-10 20:15 - Updated: 2025-07-15 13:14
Severity ?
Summary
An unrestricted file upload vulnerability exists in ProcessMaker versions prior to 3.5.4 due to improper handling of uploaded plugin archives. An attacker with administrative privileges can upload a malicious .tar plugin file containing arbitrary PHP code. Upon installation, the plugin’s install() method is invoked, resulting in execution of attacker-supplied PHP code on the server with the privileges of the web server user. This vulnerability can be chained with CVE-2022-38577 — a privilege escalation flaw in the user profile page — to achieve full remote code execution from a low-privileged account.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An unrestricted file upload vulnerability exists in ProcessMaker versions prior to 3.5.4 due to improper handling of uploaded plugin archives. An attacker with administrative privileges can upload a malicious .tar plugin file containing arbitrary PHP code. Upon installation, the plugin\u2019s install() method is invoked, resulting in execution of attacker-supplied PHP code on the server with the privileges of the web server user.\u00a0This vulnerability can be chained with CVE-2022-38577 \u2014 a privilege escalation flaw in the user profile page \u2014 to achieve full remote code execution from a low-privileged account."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de carga de archivos sin restricciones en versiones de ProcessMaker anteriores a la 3.5.4 debido a la gesti\u00f3n incorrecta de los archivos de complementos cargados. Un atacante con privilegios administrativos puede cargar un archivo .tar de complemento malicioso que contenga c\u00f3digo PHP arbitrario. Tras la instalaci\u00f3n, se invoca el m\u00e9todo install() del complemento, lo que provoca la ejecuci\u00f3n del c\u00f3digo PHP proporcionado por el atacante en el servidor con los privilegios del usuario del servidor web. Esta vulnerabilidad puede vincularse con CVE-2022-38577 (una falla de escalada de privilegios en la p\u00e1gina de perfil de usuario) para lograr la ejecuci\u00f3n remota completa de c\u00f3digo desde una cuenta con pocos privilegios."
}
],
"id": "CVE-2025-34097",
"lastModified": "2025-07-15T13:14:49.980",
"metrics": {
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "disclosure@vulncheck.com",
"type": "Secondary"
}
]
},
"published": "2025-07-10T20:15:25.260",
"references": [
{
"source": "disclosure@vulncheck.com",
"url": "https://process-maker-authenticated-plugin-upload-rce"
},
{
"source": "disclosure@vulncheck.com",
"url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/processmaker_plugin_upload.rb"
},
{
"source": "disclosure@vulncheck.com",
"url": "https://vulncheck.com/advisories/process-maker-authenticated-plugin-upload-rce"
},
{
"source": "disclosure@vulncheck.com",
"url": "https://wiki.processmaker.net/3.0/Plugin_Development"
},
{
"source": "disclosure@vulncheck.com",
"url": "https://www.exploit-db.com/exploits/44399"
},
{
"source": "disclosure@vulncheck.com",
"url": "https://www.fortiguard.com/encyclopedia/ips/45757"
}
],
"sourceIdentifier": "disclosure@vulncheck.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-434"
}
],
"source": "disclosure@vulncheck.com",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…