CVE-2025-63678

7.2 HIGH

📋 TL;DR

This vulnerability allows authenticated administrators in CMS Made Simple Foundation File Manager v2.2.22 to upload arbitrary PHP files via the /uploads/ endpoint, leading to remote code execution. Attackers with compromised admin credentials can take full control of affected systems. Organizations using this specific version are at risk.

💻 Affected Systems

Products:
  • CMS Made Simple Foundation File Manager
Versions: v2.2.22
Operating Systems: All operating systems running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrator privileges to exploit, but default installations grant admin access to legitimate users.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining persistent access, data exfiltration, ransomware deployment, and lateral movement within the network.

🟠

Likely Case

Web server compromise leading to website defacement, data theft, or deployment of malware/backdoors on the affected system.

🟢

If Mitigated

Limited impact with proper file upload validation and admin credential protection, potentially only affecting the web application directory.

🌐 Internet-Facing: HIGH - Web applications with this vulnerable component exposed to the internet are prime targets for credential theft and subsequent exploitation.
🏢 Internal Only: MEDIUM - Internal systems are still vulnerable if admin credentials are compromised through phishing or other means.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin credentials but is straightforward once obtained. The PDF reference contains technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

1. Check for official patch from CMS Made Simple Foundation. 2. If available, download and apply according to vendor instructions. 3. Verify file upload restrictions are properly implemented.

🔧 Temporary Workarounds

Restrict File Upload Types

all

Configure the file manager to only allow specific non-executable file extensions

Modify file upload validation in the application configuration to reject .php, .phtml, .php5, .php7 extensions

Web Server File Execution Restriction

linux

Configure web server to prevent execution of uploaded files

For Apache: Add 'php_flag engine off' to .htaccess in uploads directory
For Nginx: Add 'location ~ \.php$ { deny all; }' to uploads location block

🧯 If You Can't Patch

  • Implement strict access controls for admin accounts with MFA and regular credential rotation
  • Deploy WAF rules to block PHP file uploads to the /uploads/ endpoint

🔍 How to Verify

Check if Vulnerable:

Check if CMS Made Simple Foundation File Manager version 2.2.22 is installed and if the /uploads/ endpoint accepts PHP files with admin credentials.

Check Version:

Check the file manager's configuration files or admin interface for version information

Verify Fix Applied:

Attempt to upload a PHP file with admin credentials - it should be rejected or saved without execution capability.

📡 Detection & Monitoring

Log Indicators:

  • PHP file uploads to /uploads/ endpoint
  • Unusual admin login activity followed by file uploads
  • Web server logs showing execution of uploaded PHP files

Network Indicators:

  • HTTP POST requests to /uploads/ with PHP file content
  • Subsequent requests to uploaded PHP files

SIEM Query:

source="web_logs" AND (uri_path="/uploads/" AND file_extension=".php") OR (uri_path CONTAINS "/uploads/" AND response_code=200 AND user_agent UNUSUAL)

🔗 References

📤 Share & Export