CVE-2025-65963

5.4 MEDIUM

📋 TL;DR

This vulnerability allows non-member users to create folders and upload/download files as ZIP archives in public spaces due to insufficient authorization checks. Only public spaces are affected; private spaces remain secure. Users of the Files module in HumHub are impacted.

💻 Affected Systems

Products:
  • HumHub Files module (cfiles)
Versions: All versions prior to 0.16.11 and 0.17.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects public spaces; private spaces are not vulnerable. Requires the Files module to be installed and enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized users could upload malicious files, overwrite legitimate files, or exfiltrate sensitive data from public spaces, potentially leading to data loss or malware distribution.

🟠

Likely Case

Non-members gain unintended access to modify or download files in public spaces, disrupting collaboration and potentially exposing non-sensitive information.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to minor unauthorized file operations in public spaces only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires no authentication and minimal technical skill, making it accessible to basic attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.16.11 or 0.17.2

Vendor Advisory: https://github.com/humhub/cfiles/security/advisories/GHSA-rv2x-7qwp-2hf4

Restart Required: No

Instructions:

1. Update the Files module to version 0.16.11 (for stable branch) or 0.17.2 (for development branch). 2. Verify the update via the HumHub admin panel or version check command.

🔧 Temporary Workarounds

Disable public spaces

all

Temporarily restrict all spaces to private mode to prevent unauthorized access.

Disable Files module

all

Temporarily disable the Files module if not essential, removing the attack surface.

🧯 If You Can't Patch

  • Monitor logs for unauthorized file operations in public spaces and implement strict access controls.
  • Use web application firewalls (WAF) to block suspicious file upload/download requests targeting public spaces.

🔍 How to Verify

Check if Vulnerable:

Check the installed version of the Files module in HumHub admin panel or via version file.

Check Version:

Check the module version in HumHub admin interface under 'Modules' or inspect the module's version file.

Verify Fix Applied:

Confirm the module version is 0.16.11 or higher (stable) or 0.17.2 or higher (development).

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized user file uploads/downloads in public spaces
  • ZIP archive creation by non-members

Network Indicators:

  • Unusual file transfer patterns to/from public space endpoints

SIEM Query:

source="humhub_logs" AND (event="file_upload" OR event="file_download") AND user_role="non_member" AND space_type="public"

🔗 References

📤 Share & Export