An issue was discovered in the Thermo Fisher Torrent Suite Django application 5.18.1. The /configure/plugins/plugin/upload/zip/ and /configure/newupdates/offline/bundle/upload/ endpoints allow low-privilege users to upload ZIP files to the server. The plupload_file_upload function handles these file uploads and constructs the destination file path by using either the name parameter or the uploaded filename, neither of which is properly sanitized. The file extension is extracted by splitting the filename, and a format string is used to construct the final file path, leaving the destination path vulnerable to path traversal. An authenticated attacker with network connectivity can write arbitrary files to the server, enabling remote code execution after overwriting an executable file. An example is the pdflatex executable, which is executed through subprocess.Popen in the write_report_pdf function after requests to a /report/latex/(\d+).pdf endpoint.
History

Thu, 04 Dec 2025 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Thermofisher
Thermofisher torrent Suite
Vendors & Products Thermofisher
Thermofisher torrent Suite

Thu, 04 Dec 2025 15:15:00 +0000

Type Values Removed Values Added
Description An issue was discovered in the Thermo Fisher Torrent Suite Django application 5.18.1. The /configure/plugins/plugin/upload/zip/ and /configure/newupdates/offline/bundle/upload/ endpoints allow low-privilege users to upload ZIP files to the server. The plupload_file_upload function handles these file uploads and constructs the destination file path by using either the name parameter or the uploaded filename, neither of which is properly sanitized. The file extension is extracted by splitting the filename, and a format string is used to construct the final file path, leaving the destination path vulnerable to path traversal. An authenticated attacker with network connectivity can write arbitrary files to the server, enabling remote code execution after overwriting an executable file. An example is the pdflatex executable, which is executed through subprocess.Popen in the write_report_pdf function after requests to a /report/latex/(\d+).pdf endpoint.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-12-04T00:00:00.000Z

Updated: 2025-12-04T15:00:55.325Z

Reserved: 2025-07-18T00:00:00.000Z

Link: CVE-2025-54307

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-04T15:15:59.163

Modified: 2025-12-04T17:15:08.283

Link: CVE-2025-54307

cve-icon Redhat

No data.