{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-6002","assignerOrgId":"27b6da8a-f51d-48d9-9eef-9b7f3405d20d","state":"PUBLISHED","assignerShortName":"BLSOPS","dateReserved":"2025-06-11T15:56:45.306Z","datePublished":"2025-06-11T16:26:47.283Z","dateUpdated":"2025-06-11T17:29:01.082Z"},"containers":{"cna":{"affected":[{"collectionURL":"https://virtuemart.net/","defaultStatus":"unaffected","packageName":"VirtueMart","platforms":["Windows","Linux"],"product":"VirtueMart","repo":"https://dev.virtuemart.net/","vendor":"VirtueMart","versions":[{"lessThan":"4.4.10","status":"affected","version":"3.0.0","versionType":"4.4.10"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"An unrestricted file upload vulnerability exists in the Product Image section of the VirtueMart backend. Authenticated attackers can upload files with arbitrary extensions, including executable or malicious files, potentially leading to remote code execution or other security impacts depending on server configuration."}],"value":"An unrestricted file upload vulnerability exists in the Product Image section of the VirtueMart backend. Authenticated attackers can upload files with arbitrary extensions, including executable or malicious files, potentially leading to remote code execution or other security impacts depending on server configuration."}],"impacts":[{"capecId":"CAPEC-650","descriptions":[{"lang":"en","value":"CAPEC-650 Upload a Web Shell to a Web Server"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-434","description":"CWE-434 Unrestricted Upload of File with Dangerous Type","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"27b6da8a-f51d-48d9-9eef-9b7f3405d20d","shortName":"BLSOPS","dateUpdated":"2025-06-11T16:26:47.283Z"},"references":[{"url":"https://blog.blacklanternsecurity.com/p/doomla-zero-days"}],"source":{"discovery":"UNKNOWN"},"title":"VirtueMart - Unrestricted File Upload","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-06-11T17:28:48.786137Z","id":"CVE-2025-6002","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-11T17:29:01.082Z"}}]}}