Source: Ministry of education information & communication security contingency platform
Publication Number | TACERT-ANA-2025071511075151 | Publication Time | 2025/07/15 11:15 |
Incident Type | ANA-Vulnerability Alert | Discovery Time | 2025/07/15 11:15 |
Impact Level | Low | ||
[Subject] 【Vulnerability Alert】Wellchoose|Signature Service (BatchSignCS) - Arbitrary File Write through Path Traversal |
|||
[Content] Forwarded from TWCERTCC-200-202507-00000008 【Wellchoose|Signature Service (BatchSignCS) - Arbitrary File Write through Path Traversal】(CVE-2025-7619, CVSS: 8.8) BatchSignCS, a Windows background program developed by Wellchoose, contains an Arbitrary File Write vulnerability. When the program is running and a user visits a malicious website, a remote attacker can write arbitrary files to arbitrary paths, potentially exploiting the vulnerability to execute arbitrary code. Information Sharing Level: WHITE (Information content can be publicly disclosed) |
|||
[Affected Platform] Signature Service (BatchSignCS) version 3.138 and earlier |
|||
[Recommended Actions] Update to version 3.145 or later |
|||
[Reference] https://www.twcert.org.tw/tw/cp-132-10239-770ab-1.html |