CVE-2025-46001

9.8 CRITICAL

📋 TL;DR

An arbitrary file upload vulnerability in Filemanager v2.3.0 allows attackers to upload malicious PHP files by bypassing the is_allowed_file_type() function's validation. This enables remote code execution on affected systems. Anyone using Filemanager v2.3.0 is vulnerable.

💻 Affected Systems

Products:
  • Filemanager
Versions: v2.3.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Filemanager v2.3.0. Earlier versions may be vulnerable if similar code exists.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the server, data exfiltration, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Webshell deployment leading to data theft, defacement, or use as a pivot point for further attacks.

🟢

If Mitigated

Limited impact if proper file upload restrictions, web application firewalls, and file system permissions are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available and requires minimal technical skill to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch exists. Remove or replace Filemanager v2.3.0 with a secure alternative.

🔧 Temporary Workarounds

Restrict file upload extensions

all

Modify the is_allowed_file_type() function to explicitly reject .php and other executable extensions.

Edit the Filemanager source code to hardcode allowed extensions (e.g., .jpg, .png, .pdf) and reject all others.

Implement web server restrictions

linux

Configure the web server to block execution of uploaded files in the upload directory.

For Apache: Add 'php_flag engine off' to .htaccess in upload directory.
For Nginx: Add 'location ~ \.php$ { deny all; }' for upload directory.

🧯 If You Can't Patch

  • Disable file upload functionality entirely in Filemanager configuration.
  • Isolate the Filemanager instance behind a web application firewall with file upload filtering rules.

🔍 How to Verify

Check if Vulnerable:

Check if Filemanager v2.3.0 is installed by examining the software version in the interface or source files.

Check Version:

Check the Filemanager configuration file or interface for version information.

Verify Fix Applied:

Test file upload with a PHP file; if rejected, the workaround is effective. For removal, confirm Filemanager v2.3.0 is no longer present.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads with .php extensions in web server logs
  • POST requests to upload endpoints with PHP content

Network Indicators:

  • HTTP POST requests to upload paths with PHP file content
  • Subsequent suspicious requests to uploaded PHP files

SIEM Query:

source="web_logs" AND (uri_path="/upload" OR uri_path="/filemanager/upload") AND (method="POST" AND (file_extension=".php" OR content_type="application/x-php"))

🔗 References

📤 Share & Export