Vulnerability Description
The E-POINT CMS eagle.gsam-1169.1 file upload feature improperly handles nested archive files. An attacker can upload a nested ZIP (a ZIP containing another ZIP) where the inner archive contains an executable file (e.g. webshell.php). When the application extracts the uploaded archives, the executable may be extracted into a web-accessible directory. This can lead to remote code execution (RCE), data disclosure, account compromise, or further system compromise depending on the web server/process privileges. The issue arises from insufficient validation of archive contents and inadequate restrictions on extraction targets.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| E-Point | E-Point Cms | eagle.gsam-1169.1 |
Related Weaknesses (CWE)
References
- https://github.com/Bidon47/CVE-2025-65806/blob/main/CVE-2025-65806.mdExploitThird Party Advisory
- https://www.e-point.pl/produkty/e-point-cmsProduct
FAQ
What is CVE-2025-65806?
CVE-2025-65806 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The E-POINT CMS eagle.gsam-1169.1 file upload feature improperly handles nested archive files. An attacker can upload a nested ZIP (a ZIP containing another ZIP) where the inner archive contains an ex...
How severe is CVE-2025-65806?
CVE-2025-65806 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-65806?
Check the references section above for vendor advisories and patch information. Affected products include: E-Point E-Point Cms.