CVE-2025-8120

9.8 CRITICAL

📋 TL;DR

CVE-2025-8120 is an unauthenticated remote code execution vulnerability in PAD CMS's photo upload functionality. An attacker can upload arbitrary files without restrictions and execute them, leading to complete system compromise. All PAD CMS installations using www, bip, or ww+bip templates are affected.

💻 Affected Systems

Products:
  • PAD CMS
Versions: All versions
Operating Systems: All platforms running PAD CMS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all three templates: www, bip, and ww+bip. Product is End-Of-Life with no official patches.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining complete control over the server, data exfiltration, ransomware deployment, and lateral movement to other systems.

🟠

Likely Case

Webshell deployment leading to persistent backdoor access, data theft, and use as a pivot point for further attacks.

🟢

If Mitigated

Limited impact if upload directory is outside web root with proper file permissions, though risk remains if attacker can find execution path.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Unauthenticated exploitation with simple file upload bypass. Weaponization is likely due to high CVSS score and RCE impact.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: None

Vendor Advisory: None

Restart Required: No

Instructions:

No official patch available. Product is End-Of-Life. Immediate migration to alternative CMS is required.

🔧 Temporary Workarounds

Disable photo upload functionality

all

Remove or disable the vulnerable upload feature entirely

# Remove or comment out upload functionality in PAD CMS code
# Disable relevant PHP scripts or routes

Web server file type restrictions

all

Configure web server to block execution of uploaded files

# Apache: Add to .htaccess in upload directory:
<FilesMatch "\.(php|phtml|php3|php4|php5|php7|phps|php8|inc|pl|py|jsp|asp|aspx|cgi|sh|bash)">
  Deny from all
</FilesMatch>
# Nginx: Add to server block:
location ~* \.(php|phtml|php3|php4|php5|php7|phps|php8|inc|pl|py|jsp|asp|aspx|cgi|sh|bash)$ {
  deny all;
}

🧯 If You Can't Patch

  • Immediately migrate to a supported CMS platform
  • Isolate PAD CMS instance behind strict network segmentation and WAF

🔍 How to Verify

Check if Vulnerable:

Test if unauthenticated file upload accepts PHP or other executable files. Check if uploaded files are accessible via web URL.

Check Version:

# Check PAD CMS installation - product is EOL so all versions vulnerable

Verify Fix Applied:

Verify upload functionality is disabled or file execution is blocked. Test with malicious file upload attempts.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to photo upload endpoints
  • POST requests with executable file extensions
  • Access to uploaded files with .php, .jsp, .asp extensions

Network Indicators:

  • HTTP POST to upload endpoints from unauthenticated sources
  • Subsequent requests to uploaded executable files

SIEM Query:

source="web_logs" AND (uri="*upload*" OR uri="*photo*upload*") AND (method="POST") AND (user_agent NOT CONTAINS "bot" OR user_agent="*")

🔗 References

📤 Share & Export