Description
An unrestricted file upload vulnerability exists in ProcessMaker versions prior to 3.5.4 due to improper handling of uploaded plugin archives. An attacker with administrative privileges can upload a malicious .tar plugin file containing arbitrary PHP code. Upon installation, the plugin’s install() method is invoked, resulting in execution of attacker-supplied PHP code on the server with the privileges of the web server user. This vulnerability can be chained with CVE-2022-38577 — a privilege escalation flaw in the user profile page — to achieve full remote code execution from a low-privileged account.
INFO
Published Date :
2025-07-10T19:12:37.309Z
Last Modified :
2026-04-07T14:09:26.734Z
Source :
VulnCheck
AFFECTED PRODUCTS
The following products are affected by CVE-2025-34097 vulnerability.
| Vendors | Products |
|---|---|
| Processmaker |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-34097.