CVE-2025-46000

6.5 MEDIUM

📋 TL;DR

This CVE describes an arbitrary file upload vulnerability in Filemanager v2.5.0 that allows attackers to upload crafted SVG files containing malicious code. When exploited, this can lead to remote code execution on the affected server. Any system running the vulnerable Filemanager component is at risk.

💻 Affected Systems

Products:
  • Filemanager
Versions: Version 2.5.0 (specifically commit c75b914)
Operating Systems: Any OS running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the /rsc/filemanager.rsc.class.php component to be accessible and file upload functionality to be enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise leading to data theft, ransomware deployment, or use as a foothold for lateral movement within the network.

🟠

Likely Case

Webshell deployment allowing persistent access, file system manipulation, and potential privilege escalation.

🟢

If Mitigated

File uploads blocked or sanitized, limiting impact to denial of service or unsuccessful exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SVG files can contain embedded scripts that execute when processed, making exploitation straightforward once the upload endpoint is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after commit c75b914

Vendor Advisory: https://github.com/simogeo/Filemanager/commit/c75b914

Restart Required: No

Instructions:

1. Update Filemanager to the latest version from the official GitHub repository. 2. Replace the vulnerable /rsc/filemanager.rsc.class.php file with the patched version. 3. Verify file upload functionality still works as expected.

🔧 Temporary Workarounds

Disable SVG file uploads

all

Configure the file manager to reject SVG file uploads entirely

Modify file upload configuration to add 'svg' to disallowed file types

Implement file type validation

all

Add server-side validation to check file content, not just extensions

Add MIME type checking and file signature validation for uploaded files

🧯 If You Can't Patch

  • Implement a web application firewall (WAF) with rules to block malicious file uploads
  • Restrict access to the file upload endpoint using network segmentation or authentication

🔍 How to Verify

Check if Vulnerable:

Check if Filemanager version is 2.5.0 and if /rsc/filemanager.rsc.class.php exists with the vulnerable code from commit c75b914

Check Version:

Check the version in Filemanager's configuration files or by examining the commit hash in the repository

Verify Fix Applied:

Verify the file upload functionality properly validates SVG files and rejects malicious content

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to /rsc/filemanager.rsc.class.php
  • SVG file uploads followed by unusual system commands

Network Indicators:

  • POST requests to file upload endpoints with SVG content
  • Subsequent outbound connections from the server

SIEM Query:

source="web_server" AND (uri="/rsc/filemanager.rsc.class.php" OR file_extension="svg") AND http_method="POST"

🔗 References

📤 Share & Export