Plattform
other
Komponente
markus
Behoben in
2.9.2
CVE-2026-25057 is a critical Remote Code Execution (RCE) vulnerability affecting MarkUs, a web application for managing student assignments. This flaw allows an attacker to upload a specially crafted ZIP file during assignment creation, potentially leading to arbitrary code execution on the server. The vulnerability impacts MarkUs versions 2.9.1 and earlier, and a patch is available in version 2.9.1.
The vulnerability lies in the assignment configuration upload process. Instructors can upload a zip file containing course configuration data. However, the application fails to properly sanitize the filenames within the uploaded zip archive. An attacker can craft a malicious zip file with carefully named entries that, when extracted, will overwrite files on the server's filesystem with attacker-controlled content. This allows for arbitrary code execution, potentially granting the attacker complete control over the MarkUs server and any data it contains. The blast radius extends to sensitive student data, course materials, and potentially other systems accessible from the compromised server. This vulnerability shares similarities with other file upload vulnerabilities where improper filename sanitization leads to path traversal and arbitrary file writes.
CVE-2026-25057 was publicly disclosed on 2026-02-09. There is no indication of active exploitation at this time. The vulnerability's CRITICAL CVSS score suggests a high potential for exploitation if a public proof-of-concept is released. It is not currently listed on the CISA KEV catalog.
Educational institutions and organizations using MarkUs for assignment submission and grading are at risk. Specifically, instructors with upload privileges are the primary targets. Shared hosting environments where multiple MarkUs instances are deployed on the same server could amplify the impact, as a compromise of one instance could potentially lead to the compromise of others.
• linux / server: Monitor MarkUs server logs for unusual file creation activity, particularly in directories related to assignment uploads. Use journalctl -f -u markus to monitor the MarkUs service logs for suspicious entries.
grep -i 'upload' /var/log/markus/markus.log | grep -i 'path' • generic web: Monitor web server access logs for requests containing suspicious file names or extensions related to assignment uploads. Check for unusual file creation timestamps in the MarkUs assignment directories.
disclosure
Exploit-Status
EPSS
0.11% (29% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation is to immediately upgrade MarkUs to version 2.9.1 or later. If upgrading is not immediately feasible, consider implementing a Web Application Firewall (WAF) rule to block uploads containing suspicious filenames or path traversal sequences. Additionally, restrict file upload permissions to the MarkUs user account and ensure the upload directory has limited write access. Monitor MarkUs logs for unusual file creation or modification activity. After upgrading, verify the fix by attempting to upload a zip file with a malicious filename and confirming that the application rejects the upload or sanitizes the filename appropriately.
Aktualisieren Sie MarkUs auf Version 2.9.1 oder höher. Diese Version behebt die Zip Slip-Schwachstelle, die die Remote-Code-Ausführung ermöglicht. Das Update verhindert, dass bösartige Dateien Systemdateien überschreiben.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2026-25057 is a critical Remote Code Execution vulnerability in MarkUs versions 2.9.1 and earlier. It allows attackers to execute arbitrary code by uploading malicious ZIP files during assignment creation.
Yes, if you are using MarkUs version 2.9.1 or earlier, you are affected by this vulnerability. Upgrade to version 2.9.1 to mitigate the risk.
The recommended fix is to upgrade MarkUs to version 2.9.1 or later. If upgrading is not immediately possible, restrict file upload privileges and implement strict input validation.
While no public exploits are currently known, the vulnerability's nature suggests a high likelihood of exploitation. It's crucial to apply the patch promptly.
Refer to the official MarkUs security advisory for detailed information and updates: [https://markus.byu.edu/security/advisories](https://markus.byu.edu/security/advisories)
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.