{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-7878","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-07-19T07:15:41.637Z","datePublished":"2025-07-20T08:32:05.287Z","dateUpdated":"2025-07-21T16:49:29.860Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-07-20T08:32:05.287Z"},"title":"Metasoft 美特软件 MetaCRM upload2.jsp unrestricted upload","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-434","lang":"en","description":"Unrestricted Upload"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-284","lang":"en","description":"Improper Access Controls"}]}],"affected":[{"vendor":"Metasoft 美特软件","product":"MetaCRM","versions":[{"version":"6.4.0","status":"affected"},{"version":"6.4.1","status":"affected"},{"version":"6.4.2","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as critical, was found in Metasoft 美特软件 MetaCRM up to 6.4.2. Affected is an unknown function of the file /common/jsp/upload2.jsp. The manipulation of the argument File leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Es wurde eine Schwachstelle in Metasoft 美特软件 MetaCRM bis 6.4.2 gefunden. Sie wurde als kritisch eingestuft. Es geht dabei um eine nicht klar definierte Funktion der Datei /common/jsp/upload2.jsp. Mittels dem Manipulieren des Arguments File mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-07-19T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-07-19T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-07-19T09:21:01.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"nu11 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.316992","name":"VDB-316992 | Metasoft 美特软件 MetaCRM upload2.jsp unrestricted upload","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.316992","name":"VDB-316992 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.611267","name":"Submit #611267 | Beijing Metasoft Technology Co., Ltd. (China) MetaCRM 6.4.2 Unrestricted Upload","tags":["third-party-advisory"]},{"url":"https://github.com/FightingLzn9/vul/blob/main/MetaCRM6-Upload-5.md","tags":["exploit"]}]},"adp":[{"references":[{"url":"https://github.com/FightingLzn9/vul/blob/main/MetaCRM6-Upload-5.md","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-07-21T16:49:26.749368Z","id":"CVE-2025-7878","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-07-21T16:49:29.860Z"}}]}}