CVE-2025-10763
📋 TL;DR
This vulnerability allows remote attackers to upload arbitrary files to the academico-sis system via the /edit-photo endpoint in the Profile Picture Handler component, potentially leading to code execution or system compromise. It affects academico-sis academico up to commit d9a9e2636fbf7e5845ee086bcb03ca62faceb6ab, with the vendor unresponsive to disclosure. The exploit is publicly disclosed and may be actively used.
💻 Affected Systems
- academico-sis academico
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to full system compromise, data theft, or ransomware deployment.
Likely Case
Unauthorized file upload resulting in web shell installation, defacement, or malware distribution.
If Mitigated
Limited impact if file uploads are restricted to safe types and locations, with proper input validation.
🎯 Exploit Status
Exploit details are publicly disclosed in references, making it easier for attackers to utilize.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not specified
Vendor Advisory: None, vendor did not respond to disclosure
Restart Required: No
Instructions:
No official patch available; consider workarounds or upgrading to a later version if a fix is released.
🔧 Temporary Workarounds
Restrict File Uploads
allImplement server-side validation to allow only specific file types (e.g., .jpg, .png) and sanitize filenames.
Configure web server (e.g., Apache/Nginx) to block uploads to /edit-photo or restrict file extensions.
Disable Vulnerable Endpoint
allTemporarily disable or block access to the /edit-photo endpoint until a fix is available.
Use firewall rules or web server configuration to deny requests to /edit-photo.
🧯 If You Can't Patch
- Monitor and audit file uploads to the /edit-photo endpoint for suspicious activity.
- Implement network segmentation to isolate the affected system and limit potential damage.
🔍 How to Verify
Check if Vulnerable:
Check if the academico-sis version is at or before commit d9a9e2636fbf7e5845ee086bcb03ca62faceb6ab by reviewing source code or version logs.
Check Version:
Check the commit hash in the academico-sis installation directory or version file.
Verify Fix Applied:
Test the /edit-photo endpoint to ensure file uploads are properly restricted and validated.
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads to /edit-photo, especially with non-image extensions or large sizes.
Network Indicators:
- HTTP POST requests to /edit-photo with unexpected file types or patterns.
SIEM Query:
source="web_logs" AND url="/edit-photo" AND (file_extension NOT IN ("jpg", "png", "gif") OR file_size > 10MB)