CVE-2025-50857

ZenTao · ZenTaoPMS

ZenTaoPMS is vulnerable to a directory traversal flaw in its AI module, enabling unauthenticated attackers to achieve remote code execution via malicious file uploads.

Executive summary

A critical directory traversal vulnerability in ZenTaoPMS allows unauthenticated attackers to execute arbitrary code on the server through a crafted file upload.

Vulnerability

The vulnerability is located in the /module/ai/control.php component. It allows for directory traversal, which an unauthenticated attacker can leverage to upload and execute arbitrary files, leading to full system compromise.

Business impact

With a CVSS score of 9.8, this vulnerability represents a maximum-severity risk. A successful exploit allows for Remote Code Execution (RCE), giving attackers full access to the server, sensitive project management data, and the ability to pivot into the internal network.

Remediation

Immediate Action: Update ZenTaoPMS to the latest stable version that addresses the directory traversal flaw in the AI module.

Proactive Monitoring: Scan the web server for unauthorized PHP files or shells, particularly in the /module/ai/ directory and temporary upload folders.

Compensating Controls: Implement a Web Application Firewall (WAF) with rules to block directory traversal patterns (e.g., ../) and restrict file upload types at the server level.

Exploitation status

Public Exploit Available: No

Analyst recommendation

Due to the potential for unauthenticated Remote Code Execution, this vulnerability must be addressed with the highest priority. Apply the vendor-provided security patches immediately to mitigate the risk of a complete server takeover.