CVE-2025-54769

An · An Multiple Products

A high-severity vulnerability exists in multiple "An" products that allows an authenticated attacker with low privileges to upload arbitrary files to sensitive locations on the server.

Executive summary

A high-severity vulnerability exists in multiple "An" products that allows an authenticated attacker with low privileges to upload arbitrary files to sensitive locations on the server. Successful exploitation could enable the attacker to execute malicious code, overwrite critical system files, or disrupt services, posing a significant risk to system integrity and availability.

Vulnerability

The vulnerability is a combination of an insecure file upload mechanism and a directory traversal flaw (CWE-22). An authenticated user, even one with read-only privileges, can exploit a file upload function. By manipulating the filename parameter in the upload request to include directory traversal sequences (e.g., ../), an attacker can force the application to save the uploaded file in an arbitrary location on the server's file system. This allows the attacker to bypass intended access controls and write a file to a sensitive directory, potentially leading to remote code execution (e.g., by uploading a web shell to a web-accessible directory) or denial of service (by overwriting critical system or application files).

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8. A successful exploit could have a significant business impact, including a complete compromise of the affected server's integrity and availability. An attacker could upload a web shell to gain remote code execution, effectively taking full control of the system. This could lead to data theft, installation of ransomware, or the use of the compromised system to attack other internal network resources. Furthermore, by overwriting critical configuration or system files, an attacker could cause a denial-of-service condition, leading to operational downtime and potential financial loss.

Remediation

Immediate Action: The primary remediation is to apply the security patches provided by the vendor across all affected systems without delay. Due to the high severity of this vulnerability, this action should be prioritized. After patching, it is crucial to verify that the update has been successfully applied and the vulnerability is mitigated.

Proactive Monitoring: Implement enhanced monitoring to detect potential exploitation attempts. Security teams should review application and web server access logs for file upload events initiated by low-privileged users, especially those containing directory traversal patterns (e.g., ../ or ..\\) in filenames or paths. Monitor for the creation of unexpected files (e.g., .php, .jsp, .sh files) in web root directories or other sensitive locations. File Integrity Monitoring (FIM) should be used to alert on any unauthorized changes to critical system and application files.

Compensating Controls: If immediate patching is not feasible, implement the following compensating controls to reduce risk:

  • Web Application Firewall (WAF): Configure a WAF to inspect incoming traffic and block requests containing directory traversal sequences in file upload parameters.
  • Access Control: If possible through application configuration, disable the file upload functionality for all read-only or non-essential user roles.
  • File System Permissions: Harden file system permissions to ensure the user account running the web application has write access only to designated upload directories and cannot write to critical system or application directories.

Exploitation status

Public Exploit Available: False (as of July 30, 2025)

Analyst recommendation

Given the high severity (CVSS 8.8) of this vulnerability and the potential for complete system compromise, immediate action is strongly recommended. Although there is no public exploit available and it is not yet on the CISA KEV list, the risk of exploitation is significant. Organizations must prioritize applying the vendor-supplied security updates to all affected "An" products. In parallel, security teams should implement proactive monitoring to detect any signs of attempted exploitation and apply compensating controls where patching cannot be performed immediately.