CVE-2025-8775

6.3 MEDIUM

📋 TL;DR

This critical vulnerability in Qiyuesuo Electronic Signature Platform allows remote attackers to upload arbitrary files without restrictions via the /api/code/upload endpoint. This affects all versions up to 4.34 of the platform, potentially enabling code execution or system compromise. Organizations using vulnerable versions are at immediate risk.

💻 Affected Systems

Products:
  • Qiyuesuo Electronic Signature Platform
Versions: up to 4.34
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with the vulnerable component enabled are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system takeover, data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

File upload leading to web shell deployment, data exfiltration, or service disruption.

🟢

If Mitigated

Upload attempts blocked at network perimeter or detected by security controls before exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details are publicly available on GitHub, making this easily exploitable by attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

Upgrade to version 4.35 or later when available. Monitor vendor communications for official patch.

🔧 Temporary Workarounds

Block /api/code/upload endpoint

all

Restrict access to the vulnerable endpoint using web application firewall or network controls.

WAF rule: Block requests to */api/code/upload*

Implement file upload validation

all

Add server-side validation for file types, extensions, and content.

🧯 If You Can't Patch

  • Isolate the Qiyuesuo system in a restricted network segment
  • Implement strict network access controls and monitor for suspicious upload attempts

🔍 How to Verify

Check if Vulnerable:

Check if version is ≤4.34 in admin panel or via version API endpoint.

Check Version:

Check admin interface or system configuration for version information.

Verify Fix Applied:

Test file upload to /api/code/upload endpoint - should be rejected or properly validated.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to /api/code/upload
  • Large or suspicious files in upload directories
  • Web shell deployment attempts

Network Indicators:

  • POST requests to /api/code/upload with executable files
  • Unusual outbound connections from the Qiyuesuo server

SIEM Query:

source="qiyuesuo" AND (url="/api/code/upload" OR file_upload=true)

🔗 References

📤 Share & Export