Zhiyuan OA - Critical Arbitrary File Upload Vulnerability

SeverityHIGH

Significant risk — action recommended within 24-48 hours

Featured image for Zhiyuan OA - Critical Arbitrary File Upload Vulnerability
EDExploit-DB
Summary by CyberPings Editorial·AI-assisted·Reviewed by Rohit Rana
Ingested:
🎯

Basically, a flaw in Zhiyuan OA lets attackers upload harmful files to the server.

Quick Summary

A critical vulnerability in Zhiyuan OA allows arbitrary file uploads, posing a risk of remote code execution. Multiple software versions are affected. Immediate patching is essential to prevent exploitation.

What Happened

A serious vulnerability has been discovered in Zhiyuan OA, specifically related to its file upload functionality. This flaw allows an unauthenticated actor to exploit the system through arbitrary file uploads. The vulnerability is identified as CVE-2025-34040 and is due to improper validation in the multipart file upload handling of the wpsAssistServlet.

The Flaw

The vulnerability arises from a path traversal issue, where the realFileType and fileId parameters can be manipulated. This allows attackers to upload files outside the intended directories. By controlling these parameters, an attacker can potentially upload a JSP file that, if executed, can lead to remote code execution.

What's at Risk

If exploited, this vulnerability can result in:

  • Remote code execution on the server, allowing attackers to run arbitrary commands.
  • Complete server compromise, which could lead to access to internal networks.
  • Data exfiltration and further lateral movement within the network.

Affected Versions

The vulnerability affects multiple versions of Zhiyuan OA, including:

  • 5.0, 5.1–5.6sp1
  • 6.0–6.1sp2
  • 7.0–7.1sp1
  • 8.0–8.0sp2

Patch Status

As of now, the vendor has released patches to address this vulnerability. Users are encouraged to check the vendor's patch notice and apply updates promptly to mitigate risks.

Immediate Actions

To protect your systems:

  • Update to the latest version of Zhiyuan OA as soon as possible.
  • Review your server configurations to ensure that file uploads are properly validated.
  • Monitor for any suspicious file uploads or activities on your server.

Conclusion

The discovery of this vulnerability underscores the importance of robust input validation in web applications. Organizations using Zhiyuan OA must act swiftly to secure their systems against potential exploitation.

🔒 Pro insight: This vulnerability highlights the need for stringent file upload validation — organizations must prioritize patching to mitigate potential exploits.

Original article from

EDExploit-DB
Read Full Article

Related Pings

CRITICALVulnerabilities

ASP.NET 8.0.10 - Critical Bypass Vulnerability Discovered

A critical vulnerability in ASP.NET 8.0.10 allows attackers to bypass authentication and hijack sessions. Immediate patching is crucial to secure affected systems.

Exploit-DB·
HIGHVulnerabilities

WordPress Madara - Local File Inclusion Vulnerability Alert

A Local File Inclusion vulnerability in WordPress Madara threatens user data. This affects all sites using the theme. Immediate action is necessary to prevent data breaches.

Exploit-DB·
CRITICALVulnerabilities

Dgraph Database Vulnerability - Attackers Bypass Authentication

A critical vulnerability in Dgraph allows attackers to bypass authentication and access sensitive data. Organizations using Dgraph must isolate their databases to prevent exploitation. Immediate action is essential to mitigate risks.

Cyber Security News·
HIGHVulnerabilities

Exploitable Vulnerabilities - 87% of Organizations at Risk

A new Datadog report reveals that 87% of organizations have exploitable vulnerabilities. This affects two-fifths of services, posing serious security risks. Companies must act quickly to address these flaws.

Infosecurity Magazine·
CRITICALVulnerabilities

Fortinet FortiClient EMS - Critical 0-Day Vulnerability Exploited

Fortinet has confirmed a critical zero-day vulnerability in FortiClient EMS, tracked as CVE-2026-35616, allowing unauthenticated attackers to bypass API controls. Emergency hotfixes are now available.

Cyber Security News·
HIGHVulnerabilities

Video Conferencing Bug - CISA Orders Agencies to Patch

CISA has mandated federal agencies to patch a critical vulnerability in TrueConf software, exploited by Chinese hackers. Immediate action is essential to prevent espionage.

The Record·