CVE-2025-7864

6.3 MEDIUM

📋 TL;DR

This critical vulnerability in JeeSite allows attackers to upload arbitrary files without proper restrictions, potentially leading to remote code execution. It affects all JeeSite installations up to version 5.12.0. The vulnerability is remotely exploitable and has public exploit details available.

💻 Affected Systems

Products:
  • thinkgem JeeSite
Versions: Up to and including 5.12.0
Operating Systems: All platforms running JeeSite
Default Config Vulnerable: ⚠️ Yes
Notes: All JeeSite installations using the vulnerable file upload controller are affected regardless of configuration

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or ransomware deployment

🟠

Likely Case

Webshell upload enabling persistent backdoor access and lateral movement within the network

🟢

If Mitigated

File upload attempts blocked or logged with no successful exploitation

🌐 Internet-Facing: HIGH - Remote exploitation without authentication makes internet-facing instances prime targets
🏢 Internal Only: MEDIUM - Internal attackers could still exploit, but requires network access

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly disclosed and the vulnerability requires minimal technical skill to exploit

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in commit 3585737d21fe490ff6948d913fcbd8d99c41fc08

Vendor Advisory: https://github.com/thinkgem/jeesite5/commit/3585737d21fe490ff6948d913fcbd8d99c41fc08

Restart Required: Yes

Instructions:

1. Update JeeSite to version after 5.12.0 or apply commit 3585737d21fe490ff6948d913fcbd8d99c41fc08
2. Restart the JeeSite application server
3. Verify the patch is applied by checking the FileUploadController.java file

🔧 Temporary Workarounds

Web Application Firewall Rules

all

Implement WAF rules to block malicious file upload attempts

WAF-specific configuration to block suspicious upload patterns

File Upload Restriction

all

Configure server to only allow specific file types and implement file validation

Application-specific configuration in web.xml or application.properties

🧯 If You Can't Patch

  • Disable file upload functionality entirely if not required
  • Implement network segmentation to isolate JeeSite instances from critical systems

🔍 How to Verify

Check if Vulnerable:

Check if JeeSite version is ≤5.12.0 and review FileUploadController.java for missing file validation

Check Version:

Check application.properties or pom.xml for version information

Verify Fix Applied:

Verify commit 3585737d21fe490ff6948d913fcbd8d99c41fc08 is present in the codebase

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to /file/upload endpoints
  • Uploads of executable file types (.jsp, .war, .exe)
  • Multiple failed upload attempts

Network Indicators:

  • POST requests to file upload endpoints with suspicious payloads
  • Unusual outbound connections from JeeSite server

SIEM Query:

source="jeesite.log" AND (uri_path="/file/upload" OR file_extension IN ("jsp","war","exe"))

🔗 References

📤 Share & Export