【Vulnerability Alert】Wellchoose|Signature Service (BatchSignCS) - Arbitrary File Write through Path Traversal

publish date : 2025-07-21 update date : 2025-07-21

Source: Ministry of education information & communication security contingency platform

Publication Number TACERT-ANA-2025071511075151 Publication Time 2025/07/15 11:15
Incident Type ANA-Vulnerability Alert Discovery Time 2025/07/15 11:15
Impact Level Low  
[Subject]
【Vulnerability Alert】Wellchoose|Signature Service (BatchSignCS) - Arbitrary File Write through Path Traversal
[Content]
Forwarded from TWCERTCC-200-202507-00000008

【Wellchoose|Signature Service (BatchSignCS) - Arbitrary File Write through Path Traversal】(CVE-2025-7619, CVSS: 8.8) BatchSignCS, a Windows background program developed by Wellchoose, contains an Arbitrary File Write vulnerability. When the program is running and a user visits a malicious website, a remote attacker can write arbitrary files to arbitrary paths, potentially exploiting the vulnerability to execute arbitrary code.

Information Sharing Level: WHITE (Information content can be publicly disclosed)
[Affected Platform]
Signature Service (BatchSignCS) version 3.138 and earlier
[Recommended Actions]
Update to version 3.145 or later
[Reference]
https://www.twcert.org.tw/tw/cp-132-10239-770ab-1.html
(This notification is for informational purposes only and does not constitute a cybersecurity incident).
If you have questions or suggestions regarding this notification, please feel free to contact us.
Ministry of education information & communication security contingency platform
Website: https://info.cert.tanet.edu.tw/
Phone: +886-7-5250211
Internet Phone: 98400000
E-Mail: service@cert.tanet.edu.tw
Organizer: Computer Center