CVE-2025-65806
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to upload a specially crafted ZIP file that contains another ZIP file with a malicious executable, which can then be extracted and run on the server. If the server has weak security settings, this could lead to remote code execution, allowing the attacker to take control of the system or access sensitive data.
Technical Description
The E-POINT CMS eagle.gsam-1169.1 file upload feature improperly handles nested archive files. An attacker can upload a nested ZIP (a ZIP containing another ZIP) where the inner archive contains an executable file (e.g. webshell.php). When the application extracts the uploaded archives, the executable may be extracted into a web-accessible directory. This can lead to remote code execution (RCE), data disclosure, account compromise, or further system compromise depending on the web server/process privileges. The issue arises from insufficient validation of archive contents and inadequate restrictions on extraction targets.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:LExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Dec 4, 2025
4 months ago
Last Modified
Mar 11, 2026
27 days ago
Vendor
e-point
Product
e-point cms