CVE-2025-63601

9.9 CRITICAL

📋 TL;DR

CVE-2025-63601 is a critical remote code execution vulnerability in Snipe-IT asset management software. Authenticated attackers can upload malicious backup files containing arbitrary files and execute system commands on the server. All organizations running vulnerable Snipe-IT versions are affected.

💻 Affected Systems

Products:
  • Snipe-IT
Versions: All versions before 8.3.3
Operating Systems: All platforms running Snipe-IT
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access, but any authenticated user can exploit this vulnerability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands, steal sensitive data, deploy ransomware, pivot to other systems, and maintain persistent access.

🟠

Likely Case

Data theft, credential harvesting, deployment of backdoors, and lateral movement within the network.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege access, and file upload restrictions are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward with publicly available proof-of-concept code.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.3.3

Vendor Advisory: https://github.com/grokability/snipe-it/releases/tag/v8.3.3

Restart Required: Yes

Instructions:

1. Backup your Snipe-IT database and files. 2. Update to version 8.3.3 or later via git pull or package update. 3. Run composer install and php artisan migrate. 4. Restart your web server and queue workers.

🔧 Temporary Workarounds

Restrict Backup File Uploads

all

Temporarily disable or restrict backup file upload functionality via web server configuration or application settings.

# Configure web server to block /backups/upload endpoint
# Example for Apache: RewriteRule ^/backups/upload - [F]
# Example for Nginx: location ~ ^/backups/upload { deny all; }

Implement File Upload Validation

all

Add server-side validation to reject suspicious backup files and limit file types/extensions.

# Add to Snipe-IT configuration or middleware
# Validate file signatures, not just extensions
# Implement file size limits and quarantine suspicious uploads

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Snipe-IT servers from critical systems
  • Enforce least privilege access controls and monitor authenticated user activity closely

🔍 How to Verify

Check if Vulnerable:

Check Snipe-IT version via web interface or command line. If version is below 8.3.3, the system is vulnerable.

Check Version:

php artisan snipeit:version

Verify Fix Applied:

After updating, verify version is 8.3.3 or higher and test backup upload functionality with safe test files.

📡 Detection & Monitoring

Log Indicators:

  • Unusual backup file uploads from authenticated users
  • Large or suspicious file uploads to backup endpoints
  • System command execution in web server logs

Network Indicators:

  • Unusual outbound connections from Snipe-IT server
  • Traffic to suspicious domains/IPs following backup uploads

SIEM Query:

source="snipe-it-logs" AND (uri_path="/backups/upload" OR message="backup upload") AND file_size>1000000

🔗 References

📤 Share & Export