CVE-2025-67260

| EUVD-2025-208903 HIGH
2026-03-20 mitre
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
EUVD ID Assigned
Mar 20, 2026 - 15:52 euvd
EUVD-2025-208903
Analysis Generated
Mar 20, 2026 - 15:52 vuln.today
CVE Published
Mar 20, 2026 - 00:00 nvd
HIGH 8.8

Description

The Terrapack software, from ASTER TEC / ASTER S.p.A., with the indicated components and versions has a file upload vulnerability that may allow attackers to execute arbitrary code. Vulnerable components include Terrapack TkWebCoreNG:: 1.0.20200914, Terrapack TKServerCGI 2.5.4.150, and Terrapack TpkWebGIS Client 1.0.0.

Analysis

A file upload vulnerability exists in multiple Terrapack software components from ASTER TEC / ASTER S.p.A. that permits remote code execution when attackers upload malicious files. The affected products include Terrapack TkWebCoreNG version 1.0.20200914, Terrapack TKServerCGI version 2.5.4.150, and Terrapack TpkWebGIS Client version 1.0.0. Proof-of-concept code is available in public repositories, and the vulnerability enables arbitrary code execution on affected systems.

Technical Context

The vulnerability is rooted in improper file upload handling within web-facing components of the Terrapack software suite, specifically in the TkWebCoreNG web framework and TKServerCGI server implementations. The weakness falls under the general category of unrestricted file uploads with insufficient validation, allowing attackers to bypass file type restrictions and upload executable code. The affected technology stack involves web application server components designed for geographic information system (GIS) operations. While specific CWE classification is not provided in the vulnerability record, this type of flaw typically maps to CWE-434 (Unrestricted Upload of File with Dangerous Type). The CPE data available indicates generic product identification (cpe:2.3:a:n/a:n/a), suggesting incomplete vendor CPE registration, which complicates automated vulnerability matching and patch tracking.

Affected Products

Terrapack TkWebCoreNG version 1.0.20200914 is affected, as is Terrapack TKServerCGI version 2.5.4.150, and Terrapack TpkWebGIS Client version 1.0.0. No explicit upper bound on affected versions is documented in the CVE record. The vendor is ASTER TEC / ASTER S.p.A. Formal CPE strings are not precisely specified beyond the generic placeholder (cpe:2.3:a:n/a:n/a:*:*:*:*:*:*:*:*), indicating vendor CPE registration deficiencies. Organizations using Terrapack GIS software should assume all indicated component versions are vulnerable. References include the vendor domain http://aster.com and http://terrapack.com; however, no official vendor security advisory URL is documented in the NVD references.

Remediation

Contact ASTER TEC / ASTER S.p.A. directly via http://aster.com or http://terrapack.com to obtain patched versions of Terrapack TkWebCoreNG, TKServerCGI, and TpkWebGIS Client. The vendor has not published explicit patch versions or advisory URLs in the NVD record, requiring vendor communication to obtain fixes. Pending vendor patches, implement network-layer mitigations: restrict web server access to trusted IP ranges and trusted clients only; disable file upload functionality if not required; deploy a web application firewall (WAF) to block suspicious file uploads and enforce strict file type whitelisting at the application and filesystem level; monitor file upload directories for execution attempts; and isolate affected systems on network segments with minimal lateral movement paths. For critical deployments, consider replacing Terrapack with actively maintained GIS software alternatives until patches are confirmed available. Italian CSIRT (https://www.acn.gov.it/portale/en/csirt-italia) may provide additional coordination or vendor contact information.

Priority Score

44
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +44
POC: 0

Share

CVE-2025-67260 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy