Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-34040— Seeyon Zhiyuan OA System Path Traversal File Upload

EPSS 14.83% · P95

Public Exploits 2

ExploitDB · 1 EDB-52490 [webapps]

Affected Version Matrix 7

VendorProductVersion RangeStatus
Seeyon (Beijing Zhiyuan Internet Software Co., Ltd.)Zhiyuan OA Web Application System5.0affected
5.1≤ 5.6sp1affected
6.0≤ 6.1sp2affected
7.0affected
7.0sp1≤ 7.1affected
7.1sp1affected
8.0≤ 8.0sp2affected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-34040

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Seeyon Zhiyuan OA System Path Traversal File Upload
Source: NVD (National Vulnerability Database)
Vulnerability Description
An arbitrary file upload vulnerability exists in the Zhiyuan OA platform via the wpsAssistServlet interface. The realFileType and fileId parameters are improperly validated during multipart file uploads, allowing unauthenticated attackers to upload crafted JSP files outside of intended directories using path traversal. Successful exploitation enables remote code execution as the uploaded file can be accessed and executed through the web server. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-01 UTC.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
危险类型文件的不加限制上传
Source: NVD (National Vulnerability Database)
Vulnerability Title
Seeyon Zhiyuan OA 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Seeyon Zhiyuan OA(致远OA)是中国致远互联(Seeyon)公司的一个协同管理软件。 Seeyon Zhiyuan OA存在安全漏洞,该漏洞源于wpsAssistServlet接口中realFileType和fileId参数验证不足导致任意文件上传。以下版本受到影响:5.0版本、5.1至5.6sp1版本、6.0至6.1sp2版本、7.0版本、7.0sp1至7.1版本、7.1sp1版本和8.0至8.0sp2版本。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

II. Public POCs for CVE-2025-34040

#POC DescriptionSource LinkShenlong Link
1An arbitrary file upload vulnerability exists in the Zhiyuan OA platform 5.0, 5.1 - 5.6sp1, 6.0 - 6.1sp2, 7.0, 7.0sp1 - 7.1, 7.1sp1, and 8.0 - 8.0sp2 via the wpsAssistServlet interface. The realFileType and fileId parameters are improperly validated during multipart file uploads, allowing unauthenticated attackers to upload crafted JSP files outside of intended directories using path traversal. Successful exploitation enables remote code execution as the uploaded file can be accessed and executed through the web server. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-34040.yamlPOC Details
2致远OA存在文件上传导致RCE(CVE-2025-34040)https://github.com/jisi-001/CVE-2025-34040ExpPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-34040

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2025-34040

No comments yet


Leave a comment