CVE-2025-63994

9.8 CRITICAL

📋 TL;DR

An arbitrary file upload vulnerability in RichFilemanager v2.7.6 allows attackers to upload malicious files to the server, potentially leading to remote code execution. This affects any system running the vulnerable version of RichFilemanager with the upload functionality accessible. Attackers can compromise the server and gain control over the affected system.

💻 Affected Systems

Products:
  • RichFilemanager
Versions: v2.7.6
Operating Systems: Any OS running PHP (Linux, Windows, macOS)
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default configuration of the UploadHandler.php component. Any installation with file upload functionality enabled is vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise leading to data theft, ransomware deployment, lateral movement within the network, and persistent backdoor installation.

🟠

Likely Case

Webshell upload leading to unauthorized file access, data exfiltration, and potential privilege escalation on the server.

🟢

If Mitigated

File upload attempts blocked or quarantined with no code execution due to proper file validation and server hardening.

🌐 Internet-Facing: HIGH - The upload endpoint is typically internet-accessible in web applications, making exploitation trivial for remote attackers.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this, but requires network access to the vulnerable component.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is simple to exploit - attackers only need to craft a malicious file and upload it to the vulnerable endpoint. Public proof-of-concept exists in the GitHub issue.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2.7.7 or later

Vendor Advisory: https://github.com/psolom/RichFilemanager/issues/412

Restart Required: No

Instructions:

1. Backup current installation. 2. Download latest version from official repository. 3. Replace vulnerable files with patched version. 4. Verify upload functionality works correctly with proper file validation.

🔧 Temporary Workarounds

Disable Upload Handler

linux

Temporarily disable the vulnerable UploadHandler.php component

mv /path/to/php/UploadHandler.php /path/to/php/UploadHandler.php.disabled

Implement File Type Validation

all

Add strict file extension and MIME type validation before processing uploads

🧯 If You Can't Patch

  • Implement Web Application Firewall (WAF) rules to block malicious file uploads
  • Restrict access to the upload endpoint using network ACLs or authentication

🔍 How to Verify

Check if Vulnerable:

Check if RichFilemanager version is 2.7.6 and if /php/UploadHandler.php exists and is accessible

Check Version:

grep -r 'version' /path/to/richfilemanager/ | grep -i '2.7.6'

Verify Fix Applied:

Verify version is 2.7.7 or later and test file upload with malicious extensions to ensure they are rejected

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads with PHP/executable extensions
  • Multiple failed upload attempts
  • Uploads to /php/UploadHandler.php from suspicious IPs

Network Indicators:

  • POST requests to /php/UploadHandler.php with executable file content
  • Unusual outbound connections from web server after file upload

SIEM Query:

source="web_logs" AND uri="/php/UploadHandler.php" AND (file_extension="php" OR file_extension="exe" OR file_extension="sh")

🔗 References

📤 Share & Export