CVE-2025-34097
Severity CVSS v4.0:
HIGH
Type:
CWE-434
Unrestricted Upload of File with Dangerous Type
Publication date:
10/07/2025
Last modified:
10/07/2025
Description
An unrestricted file upload vulnerability exists in ProcessMaker versions prior to 3.5.4 due to improper handling of uploaded plugin archives. An attacker with administrative privileges can upload a malicious .tar plugin file containing arbitrary PHP code. Upon installation, the plugin’s install() method is invoked, resulting in execution of attacker-supplied PHP code on the server with the privileges of the web server user. This vulnerability can be chained with CVE-2022-38577 — a privilege escalation flaw in the user profile page — to achieve full remote code execution from a low-privileged account.
Impact
Base Score 4.0
8.60
Severity 4.0
HIGH
References to Advisories, Solutions, and Tools
- https://process-maker-authenticated-plugin-upload-rce
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/processmaker_plugin_upload.rb
- https://vulncheck.com/advisories/process-maker-authenticated-plugin-upload-rce
- https://wiki.processmaker.net/3.0/Plugin_Development
- https://www.exploit-db.com/exploits/44399
- https://www.fortiguard.com/encyclopedia/ips/45757