CVE-2013-10034
CRITICALKaseya KServer <6.3.0.2 - File Upload
Title source: llmDescription
An unrestricted file upload vulnerability exists in Kaseya KServer versions prior to 6.3.0.2. The uploadImage.asp endpoint allows unauthenticated users to upload files to arbitrary paths via a crafted filename parameter in a multipart/form-data POST request. Due to the lack of authentication and input sanitation, an attacker can upload a file with an .asp extension to a web-accessible directory, which can then be invoked to execute arbitrary code with the privileges of the IUSR account. The vulnerability enables remote code execution without prior authentication and was resolved in version 6.3.0.2 by removing the vulnerable uploadImage.asp endpoint.
Exploits (2)
exploitdb
WORKING POC
by Security-Assessment.com · textwebappsasp
https://www.exploit-db.com/exploits/29675
metasploit
WORKING POC
EXCELLENT
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/kaseya_uploadimage_file_upload.rb
References (4)
Scores
CVSS v4
9.3
EPSS
0.4049
EPSS Percentile
97.4%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-434
Status
published
Products (1)
Kaseya/KServer
< 6.3.0.2
Published
Jul 31, 2025
Tracked Since
Feb 18, 2026