CVE-2025-13949

6.3 MEDIUM

📋 TL;DR

This vulnerability in ProudMuBai GoFilm allows attackers to upload arbitrary files without restrictions via the SingleUpload function. It affects all systems running vulnerable versions of the software and can be exploited remotely. The exploit is publicly available, increasing the risk of compromise.

💻 Affected Systems

Products:
  • ProudMuBai GoFilm
Versions: 1.0.0, 1.0.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with the vulnerable FileController.go component are affected. No special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through remote code execution via malicious file upload, leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Attackers upload web shells or malware to gain unauthorized access, deface websites, or use the system as a foothold for further attacks.

🟢

If Mitigated

Limited impact with proper file upload validation, but still poses risk if workarounds are bypassed.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available on GitHub, making this easy to weaponize. Remote exploitation requires no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None

Restart Required: No

Instructions:

No official patch available. Vendor did not respond to disclosure. Consider workarounds or discontinuing use.

🔧 Temporary Workarounds

Implement File Upload Validation

all

Add server-side validation to restrict file types, extensions, and content. Implement file size limits and scan uploaded files.

Modify /server/controller/FileController.go to add validation logic before processing uploads

Disable File Upload Endpoint

all

Temporarily disable or block access to the vulnerable SingleUpload endpoint until a fix is available.

Comment out or remove SingleUpload function in FileController.go and restart service

🧯 If You Can't Patch

  • Deploy a web application firewall (WAF) with rules to block malicious file upload patterns
  • Isolate affected systems from critical networks and implement strict network segmentation

🔍 How to Verify

Check if Vulnerable:

Check if GoFilm version is 1.0.0 or 1.0.1 and if FileController.go contains the SingleUpload function without proper validation.

Check Version:

Check application configuration files or deployment manifests for version information

Verify Fix Applied:

Test file upload functionality with restricted file types; successful upload of disallowed files indicates vulnerability.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload activity to /server/controller/FileController.go
  • Uploads of executable files, scripts, or unusual file types

Network Indicators:

  • HTTP POST requests to upload endpoints with suspicious file extensions
  • Traffic patterns indicating file upload exploitation

SIEM Query:

source="web_logs" AND uri="/server/controller/FileController.go" AND method="POST" AND (file_extension="php" OR file_extension="jsp" OR file_extension="exe")

🔗 References

📤 Share & Export