CVE Alert: CVE-2025-12867 – Hundred Plus – EIP Plus
CVE-2025-12867
EIP Plus developed by Hundred Plus has an Arbitrary File Uplaod vulnerability, allowing privileged remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.
AI Summary Analysis
Risk verdict
High risk with potential for remote web shell upload and code execution; treat as a priority if the system is externally accessible.
Why this matters
No user interaction is required and the flaw is exploitable over the network, enabling an attacker to compromise the server unnoticed. The impact spans confidentiality, integrity, and availability, raising the likelihood of data theft, tampering, or service disruption.
Most likely attack path
An attacker with network access targets the vulnerable upload endpoint and, leveraging the elevated privileges required by the flaw, uploads a malicious payload to gain code execution. Once a web shell is deployed, moves within the host or to adjacent services may be possible if permissions permit. The lack of user interaction lowers the barrier, but the need for high privileges constrains initial access.
Who is most exposed
Deployments with internet-facing web endpoints that accept file uploads are at greatest risk, especially where upload handling or permissions are poorly restricted; common in externally accessible web apps or hosted services with web-based admin interfaces.
Detection ideas
- Unusual or large file uploads to the web-facing upload path
- New or modified files in webroot or application directories shortly after access attempts
- Web server access logs showing repeated POSTs to upload endpoints from anomalous IPs
- Known web shell indicators or unusual payloads in upload archives
- Sudden spikes in elevated-privilege activity on the host
Mitigation and prioritisation
- Apply patch to release 240626 or later immediately.
- Disable or tightly restrict file upload functionality; enforce strict whitelisting of allowed file types.
- Implement robust server-side validation, scanning, and storage isolation for uploaded files.
- Enforce least-privilege for the process/service and strengthen authentication for upload endpoints; consider WAF/rate limiting.
- Change-management: test the patch in staging, roll out during maintenance window; monitor post-deploy for anomalies. If KEV true or EPSS ≥ 0.5, treat as priority 1.
Support Our Work
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.
