We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-34100

BuilderEngine 3.5.0 RCE via Unauthenticated Arbitrary File Upload



Description

An unrestricted file upload vulnerability exists in BuilderEngine 3.5.0 via the integration of the elFinder 2.0 file manager and its use of the jQuery File Upload plugin. The plugin fails to properly validate or restrict file types or locations during upload operations, allowing an attacker to upload a malicious .php file and subsequently execute arbitrary PHP code on the server under the context of the web server process. While the root vulnerability lies within the jQuery File Upload component, BuilderEngine’s improper integration and lack of access controls expose this functionality to unauthenticated users, resulting in full remote code execution.

Reserved 2025-04-15 | Published 2025-07-10 | Updated 2025-07-11 | Assigner VulnCheck


CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-434 Unrestricted Upload of File with Dangerous Type

CWE-20 Improper Input Validation

CWE-306 Missing Authentication for Critical Function

Product status

Default status
unknown

3.5.0
affected

Credits

metanubix finder

References

raw.githubusercontent.com/...tp/builderengine_upload_exec.rb exploit

www.exploit-db.com/exploits/40390 exploit

support.alertlogic.com/...elFinder-2-0-Arbitrary-File-Upload third-party-advisory

vulncheck.com/...ngine-unauthenticated-arbitrary-file-upload third-party-advisory

cve.org (CVE-2025-34100)

nvd.nist.gov (CVE-2025-34100)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-34100

Support options

Helpdesk Chat, Email, Knowledgebase