CVE-2025-5131

A vulnerability was found in Tmall Demo up to 20250505. It has been declared as critical. This vulnerability affects the function uploadCategoryImage of the file tmall/admin/uploadCategoryImage. The manipulation of the argument File leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/bdkuzma/vuln/issues/10 Exploit Third Party Advisory
https://vuldb.com/?ctiid.310210 Permissions Required
https://vuldb.com/?id.310210 Third Party Advisory VDB Entry
https://vuldb.com/?submit.571901 Third Party Advisory VDB Entry
https://github.com/bdkuzma/vuln/issues/10 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:project_team:tmall_demo:*:*:*:*:*:*:*:*

History

03 Jun 2025, 15:47

Type Values Removed Values Added
References () https://github.com/bdkuzma/vuln/issues/10 - () https://github.com/bdkuzma/vuln/issues/10 - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.310210 - () https://vuldb.com/?ctiid.310210 - Permissions Required
References () https://vuldb.com/?id.310210 - () https://vuldb.com/?id.310210 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.571901 - () https://vuldb.com/?submit.571901 - Third Party Advisory, VDB Entry
First Time Project Team
Project Team tmall Demo
CPE cpe:2.3:a:project_team:tmall_demo:*:*:*:*:*:*:*:*

28 May 2025, 18:15

Type Values Removed Values Added
References () https://github.com/bdkuzma/vuln/issues/10 - () https://github.com/bdkuzma/vuln/issues/10 -

28 May 2025, 14:58

Type Values Removed Values Added
Summary
  • (es) Se detectó una vulnerabilidad en Tmall Demo hasta la versión 20250505. Se ha declarado crítica. Esta vulnerabilidad afecta la función uploadCategoryImage del archivo tmall/admin/uploadCategoryImage. La manipulación del argumento File permite la carga sin restricciones. El ataque puede ejecutarse en remoto. Se ha hecho público el exploit y puede que sea utilizado. Este producto utiliza un sistema de entrega continua con versiones continuas. Por lo tanto, no se dispone de detalles de las versiones afectadas ni de versiones actualizadas. Se contactó al proveedor con antelación sobre esta divulgación, pero no respondió.

24 May 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-24 21:15

Updated : 2025-06-03 15:47


NVD link : CVE-2025-5131

Mitre link : CVE-2025-5131

CVE.ORG link : CVE-2025-5131


JSON object : View

Products Affected

project_team

  • tmall_demo
CWE
CWE-284

Improper Access Control

CWE-434

Unrestricted Upload of File with Dangerous Type