CVE-2025-69770
MojoPortal · MojoPortal CMS
MojoPortal CMS is vulnerable to a "Zip Slip" exploit in the SkinList.aspx endpoint, allowing attackers to execute arbitrary commands via a specially crafted zip file upload.
Executive summary
MojoPortal CMS version 2.9.0.1 is vulnerable to a critical Zip Slip flaw that enables attackers to achieve remote code execution by uploading malicious archives.
Vulnerability
This is a directory traversal vulnerability (Zip Slip) occurring during the extraction of zip files via the /DesignTools/SkinList.aspx endpoint. By crafting a zip file with ".." sequences in filenames, an attacker can write files to arbitrary locations on the server filesystem.
Business impact
A successful exploit allows for arbitrary file writes, which typically leads to Remote Code Execution (RCE) by overwriting system files or uploading web shells. This results in a total compromise of the server, potential data exfiltration, and significant downtime. The CVSS score of 10 represents the maximum possible risk level.
Remediation
Immediate Action: Update MojoPortal CMS to the latest secure version and restrict access to the DesignTools directory to trusted administrative IP addresses only.
Proactive Monitoring: Audit the filesystem for unexpected files in the web root and monitor for any suspicious process execution originating from the web server user.
Compensating Controls: Implement file integrity monitoring (FIM) and ensure the web server service runs with the least privilege possible to limit the impact of a file write.
Exploitation status
Public Exploit Available: false
Analyst recommendation
With a CVSS score of 10, this vulnerability requires an emergency response. Organizations must patch MojoPortal immediately to prevent attackers from gaining full system-level access through the skin upload functionality.