CVE-2025-8764

6.3 MEDIUM

📋 TL;DR

This critical vulnerability in linlinjava litemall allows remote attackers to upload arbitrary files without restrictions via the /wx/storage/upload endpoint. Attackers can exploit this to upload malicious files like webshells or malware to compromise the server. All users running litemall versions up to 1.8.0 are affected.

💻 Affected Systems

Products:
  • linlinjava litemall
Versions: up to 1.8.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the /wx/storage/upload endpoint specifically; any deployment with this endpoint accessible is vulnerable

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise via webshell upload leading to data theft, ransomware deployment, or use as attack platform

🟠

Likely Case

Malicious file upload enabling backdoor access, data exfiltration, or lateral movement within network

🟢

If Mitigated

File upload attempts blocked or logged with no successful exploitation

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details are publicly disclosed in GitHub issues; attack requires file upload capability but no authentication bypass

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.8.1 or later

Vendor Advisory: https://github.com/linlinjava/litemall/issues/567

Restart Required: No

Instructions:

1. Update litemall to version 1.8.1 or later. 2. Verify the /wx/storage/upload endpoint now validates file types and extensions. 3. Test file upload functionality.

🔧 Temporary Workarounds

Disable vulnerable endpoint

all

Temporarily disable or block access to the /wx/storage/upload endpoint

# In web server config (e.g., nginx): location /wx/storage/upload { deny all; }
# In application firewall: Block requests to /wx/storage/upload

Implement file upload restrictions

all

Add server-side validation for file types, extensions, and size limits

# Example in application code: Validate file extension, MIME type, and size before processing

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block malicious file upload patterns
  • Restrict network access to the litemall instance using firewall rules

🔍 How to Verify

Check if Vulnerable:

Check if litemall version is 1.8.0 or earlier and the /wx/storage/upload endpoint accepts unrestricted file uploads

Check Version:

Check litemall version in application configuration or via package manager

Verify Fix Applied:

Test file upload with restricted file types (e.g., .php, .exe) - they should be rejected in patched versions

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to /wx/storage/upload
  • Uploads of executable files or scripts
  • Multiple failed upload attempts

Network Indicators:

  • HTTP POST requests to /wx/storage/upload with suspicious file extensions
  • Unusual outbound connections after file uploads

SIEM Query:

source="web_server" AND uri="/wx/storage/upload" AND (file_extension IN ("php", "exe", "jsp", "asp") OR status_code=200)

🔗 References

📤 Share & Export