Vulnerability Description
An unrestricted file upload vulnerability exists in ProcessMaker versions prior to 3.5.4 due to improper handling of uploaded plugin archives. An attacker with administrative privileges can upload a malicious .tar plugin file containing arbitrary PHP code. Upon installation, the plugin’s install() method is invoked, resulting in execution of attacker-supplied PHP code on the server with the privileges of the web server user. This vulnerability can be chained with CVE-2022-38577 — a privilege escalation flaw in the user profile page — to achieve full remote code execution from a low-privileged account.
Related Weaknesses (CWE)
References
- https://process-maker-authenticated-plugin-upload-rce
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exp
- https://vulncheck.com/advisories/process-maker-authenticated-plugin-upload-rce
- https://wiki.processmaker.net/3.0/Plugin_Development
- https://www.exploit-db.com/exploits/44399
- https://www.fortiguard.com/encyclopedia/ips/45757
FAQ
What is CVE-2025-34097?
CVE-2025-34097 is a documented vulnerability. An unrestricted file upload vulnerability exists in ProcessMaker versions prior to 3.5.4 due to improper handling of uploaded plugin archives. An attacker with administrative privileges can upload a m...
How severe is CVE-2025-34097?
CVSS scoring is not yet available for CVE-2025-34097. Check NVD for updates.
Is there a patch for CVE-2025-34097?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.