CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
Lifecycle Timeline
4Description
File Upload vulnerability in Motivian Content Mangment System v.41.0.0 allows a remote attacker to execute arbitrary code via the Content/Gallery/Images component.
Analysis
CVE-2025-29093 is an unauthenticated file upload vulnerability in Motivian Content Management System v41.0.0 that allows remote attackers to execute arbitrary code through the Content/Gallery/Images component. The vulnerability has a CVSS score of 8.2 with high integrity impact, affecting confidentiality and code execution capabilities. No authentication is required (PR:N) and exploitation is trivial (AC:L), making this a critical threat to unpatched instances.
Technical Context
This vulnerability falls under CWE-434 (Unrestricted Upload of File with Dangerous Type), a well-established weakness in file handling mechanisms. The Motivian CMS v41.0.0 Content/Gallery/Images component fails to properly validate uploaded files before processing or storing them. Attackers can likely bypass file type restrictions through techniques such as double extensions (e.g., .php.jpg), null byte injection, MIME type manipulation, or direct upload of executable scripts. The vulnerability allows arbitrary code execution, suggesting the uploaded files are either directly executable in the web root or processed by a backend handler that interprets malicious code. This is a classic post-upload execution vulnerability where insufficient validation of file content, extension, or MIME type permits executable payloads.
Affected Products
Product: Motivian Content Management System; Affected Version: 41.0.0; Vulnerable Component: Content/Gallery/Images upload handler; Attack Vector: Network-based file upload endpoint. CPE would likely be structured as: cpe:2.3:a:motivian:content_management_system:41.0.0:*:*:*:*:*:*:* (exact vendor namespace requires official Motivian CPE registration). Any organization running Motivian CMS v41.0.0 is affected; organizations using older versions should verify patch status. No official vendor advisory reference was provided in the data, but users should check Motivian's official security advisory channels.
Remediation
Immediate actions: (1) Disable or restrict access to the Content/Gallery/Images upload endpoint until patched; (2) Implement web application firewall (WAF) rules to block common file upload attack patterns (.php, .phtml, .php5, etc.); (3) Verify file uploads are stored outside the web root or in a non-executable directory with proper MIME type serving (e.g., Content-Type: application/octet-stream). (4) Upgrade to the latest patched version of Motivian CMS (patch version not specified in provided data—check official Motivian releases). (5) Implement strict file upload validation: whitelist allowed extensions, validate MIME types server-side, use magic number verification, rename files with random names, and disable script execution in upload directories via web server configuration (.htaccess for Apache: `php_flag engine off`). (6) Conduct code audit of file upload handlers. Contact Motivian support or monitor their security advisories for official patch availability and version guidance.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-16877