EUVD-2025-18626

| CVE-2025-46157 CRITICAL
2025-06-18 [email protected]
9.9
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 14, 2026 - 22:49 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 22:49 euvd
EUVD-2025-18626
PoC Detected
Jun 26, 2025 - 15:53 vuln.today
Public exploit code
CVE Published
Jun 18, 2025 - 14:15 nvd
CRITICAL 9.9

DescriptionNVD

An issue in EfroTech Time Trax v.1.0 allows a remote attacker to execute arbitrary code via the file attachment function in the leave request form

AnalysisAI

Critical remote code execution vulnerability in EfroTech Time Trax v1.0 that exploits improper file upload validation in the leave request form's attachment functionality. An authenticated attacker with low privileges can upload and execute arbitrary code on the server, achieving complete system compromise with high confidentiality, integrity, and availability impact. The vulnerability is classified as actively exploitable (CVSS 9.9) and represents an immediate threat to all deployed instances.

Technical ContextAI

This vulnerability stems from CWE-434 (Unrestricted Upload of File with Dangerous Type), a well-known file upload validation bypass. EfroTech Time Trax v1.0 fails to properly sanitize, validate, or restrict file types uploaded through the leave request form's attachment mechanism. The application likely lacks: (1) server-side file type validation beyond client-side checks, (2) executable file extension filtering, (3) proper storage isolation from web-accessible directories, and (4) execution context restrictions. The affected component is the leave management module's file attachment handler. CPE identifier would be: cpe:2.3:a:efrotech:time_trax:1.0:*:*:*:*:*:*:* - indicating the specific product and version affected.

RemediationAI

Immediate actions: (1) Restrict access to the leave request form and file attachment functionality until patching is possible, (2) Implement strict file upload controls at the network perimeter, (3) Review uploaded files for suspicious content, (4) Monitor server logs for unusual file uploads or execution attempts. Vendor remediation: Contact EfroTech for patch availability for Time Trax v1.0. Permanent fixes required: (a) Implement strict whitelist-based file extension validation on the server side, (b) Store uploads outside the web root or in non-executable directories, (c) Rename uploaded files to remove original extensions, (d) Set proper file permissions (non-executable), (e) Implement Content-Disposition: attachment headers, (f) Use a dedicated file serving mechanism with type validation, (g) Scan uploads with antivirus/malware detection. If patching is unavailable, consider upgrading to a newer version or alternative leave management solution.

Share

EUVD-2025-18626 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy