CVE-2025-13590

Unknown · System REST API

A critical flaw in a system REST API allows an authenticated administrator to upload arbitrary files to user-controlled locations, leading to remote code execution.

Executive summary

An authenticated administrator can exploit a file upload vulnerability in the system REST API to achieve remote code execution, leading to complete system compromise.

Vulnerability

This vulnerability involves an arbitrary file upload via a system REST API. An attacker with administrative privileges can bypass restrictions to upload a specially crafted payload to a sensitive directory, subsequently executing it to achieve RCE.

Business impact

While this requires administrative access, it facilitates malicious insider activity or allows an attacker who has compromised an admin account to achieve persistent, deep-system access. The CVSS score of 9.1 reflects the critical impact of RCE, even when conditioned on high-level authentication.

Remediation

Immediate Action: Apply the latest security patches provided by the vendor to restrict file upload paths and validate file contents.

Proactive Monitoring: Audit administrative REST API logs for file upload requests to non-standard or executable directories.

Compensating Controls: Implement strict file system permissions to prevent the execution of files in directories where the REST API has write access.

Exploitation status

Public Exploit Available: No

Analyst recommendation

Organizations should ensure that administrative accounts are protected with multi-factor authentication (MFA) to prevent the initial access required for this exploit. Apply vendor-supplied patches immediately to close the RCE vector.