CVE-2025-10763

6.3 MEDIUM

📋 TL;DR

This vulnerability allows remote attackers to upload arbitrary files to the academico-sis system via the /edit-photo endpoint in the Profile Picture Handler component, potentially leading to code execution or system compromise. It affects academico-sis academico up to commit d9a9e2636fbf7e5845ee086bcb03ca62faceb6ab, with the vendor unresponsive to disclosure. The exploit is publicly disclosed and may be actively used.

💻 Affected Systems

Products:
  • academico-sis academico
Versions: Up to commit d9a9e2636fbf7e5845ee086bcb03ca62faceb6ab
Operating Systems: Not specified, likely cross-platform
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Profile Picture Handler component via the /edit-photo file; rolling release strategy may complicate version tracking.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Unauthorized file upload resulting in web shell installation, defacement, or malware distribution.

🟢

If Mitigated

Limited impact if file uploads are restricted to safe types and locations, with proper input validation.

🌐 Internet-Facing: HIGH, as the attack can be carried out remotely and the exploit is publicly disclosed.
🏢 Internal Only: MEDIUM, as internal attackers could exploit it, but remote access increases exposure.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details are publicly disclosed in references, making it easier for attackers to utilize.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: None, vendor did not respond to disclosure

Restart Required: No

Instructions:

No official patch available; consider workarounds or upgrading to a later version if a fix is released.

🔧 Temporary Workarounds

Restrict File Uploads

all

Implement server-side validation to allow only specific file types (e.g., .jpg, .png) and sanitize filenames.

Configure web server (e.g., Apache/Nginx) to block uploads to /edit-photo or restrict file extensions.

Disable Vulnerable Endpoint

all

Temporarily disable or block access to the /edit-photo endpoint until a fix is available.

Use firewall rules or web server configuration to deny requests to /edit-photo.

🧯 If You Can't Patch

  • Monitor and audit file uploads to the /edit-photo endpoint for suspicious activity.
  • Implement network segmentation to isolate the affected system and limit potential damage.

🔍 How to Verify

Check if Vulnerable:

Check if the academico-sis version is at or before commit d9a9e2636fbf7e5845ee086bcb03ca62faceb6ab by reviewing source code or version logs.

Check Version:

Check the commit hash in the academico-sis installation directory or version file.

Verify Fix Applied:

Test the /edit-photo endpoint to ensure file uploads are properly restricted and validated.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to /edit-photo, especially with non-image extensions or large sizes.

Network Indicators:

  • HTTP POST requests to /edit-photo with unexpected file types or patterns.

SIEM Query:

source="web_logs" AND url="/edit-photo" AND (file_extension NOT IN ("jpg", "png", "gif") OR file_size > 10MB)

🔗 References

📤 Share & Export