Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2019-25714

CVE-2019-25714: Seeyon OA A8 RCE Vulnerability

CVE-2019-25714 is a remote code execution flaw in Seeyon OA A8 allowing unauthenticated file writes via /seeyon/htmlofficeservlet. Attackers can deploy JSP webshells to execute OS commands with web server privileges.

Published: April 23, 2026

CVE-2019-25714 Overview

CVE-2019-25714 is a critical unauthenticated arbitrary file write vulnerability affecting Seeyon OA A8, a widely-deployed office automation platform. The vulnerability exists in the /seeyon/htmlofficeservlet endpoint, which fails to properly validate incoming requests before processing file write operations. Remote attackers can exploit this flaw by sending specially crafted POST requests containing custom base64-encoded payloads to write arbitrary files to the web application root directory without authentication.

The most significant attack scenario involves writing JSP webshells to the web root, which can then be executed through the web server to achieve arbitrary OS command execution with web server privileges. This provides attackers with full control over the affected system, enabling data exfiltration, lateral movement, and persistent access to the compromised environment.

Critical Impact

Unauthenticated remote attackers can write arbitrary files including webshells to achieve complete system compromise with web server privileges.

Affected Products

  • Seeyon OA A8

Discovery Timeline

  • 2021-03-26 - Exploitation evidence first observed by Shadowserver Foundation
  • 2026-04-21 - CVE CVE-2019-25714 published to NVD
  • 2026-04-22 - Last updated in NVD database

Technical Details for CVE-2019-25714

Vulnerability Analysis

This vulnerability is classified as CWE-434 (Unrestricted Upload of File with Dangerous Type), which in this case manifests as an arbitrary file write condition. The /seeyon/htmlofficeservlet endpoint processes incoming requests without proper authentication checks, allowing any remote attacker to interact with the vulnerable functionality.

The attack requires no authentication, no user interaction, and can be executed remotely over the network. An attacker sends a specially crafted POST request to the vulnerable endpoint containing base64-encoded file content. The server decodes this payload and writes the file contents to a location within the web application root directory that the attacker specifies or controls.

Once a malicious JSP webshell is written to the web root, the attacker can access it directly via HTTP, causing the web server to execute the embedded code. This grants the attacker arbitrary command execution capabilities with the privileges of the web server process.

Root Cause

The root cause of this vulnerability is the absence of authentication and authorization checks on the /seeyon/htmlofficeservlet endpoint, combined with insufficient input validation on the file content and destination path. The servlet blindly processes base64-encoded payloads and writes them to the filesystem without verifying the legitimacy of the request or sanitizing the file contents for potentially malicious code such as JSP webshells.

Attack Vector

The attack is network-based and requires no authentication or user interaction. An attacker crafts a malicious POST request containing a base64-encoded JSP webshell payload and sends it to the /seeyon/htmlofficeservlet endpoint. The server processes this request, decodes the payload, and writes the malicious JSP file to a location accessible via the web server. The attacker then navigates to the webshell URL to execute arbitrary OS commands.

The exploitation technique involves creating a specially formatted request that the vulnerable servlet will accept and process. According to security research documented in archived technical analyses, the payload structure follows a specific format that the htmlofficeservlet component expects, allowing attackers to bypass any minimal validation that may exist. For detailed technical analysis, see the Archived Blog Post on Getshell and 96.mk OA Getshell Analysis.

Detection Methods for CVE-2019-25714

Indicators of Compromise

  • Unexpected JSP files appearing in the Seeyon OA web root directory
  • HTTP POST requests to /seeyon/htmlofficeservlet from external or unusual IP addresses
  • Web server process spawning unexpected child processes (cmd.exe, bash, sh, powershell)
  • Anomalous outbound network connections originating from the web server process

Detection Strategies

  • Monitor HTTP access logs for POST requests targeting /seeyon/htmlofficeservlet, especially from untrusted sources
  • Implement file integrity monitoring on the Seeyon OA web root directory to detect unauthorized file creation
  • Deploy web application firewall (WAF) rules to inspect and block malicious payloads targeting this endpoint
  • Use network-based intrusion detection signatures such as the Broadcom Attack Signature or Fortiguard IPS rules

Monitoring Recommendations

  • Enable verbose logging on the Seeyon OA application server to capture all requests to the vulnerable endpoint
  • Configure alerts for new JSP file creation in web-accessible directories
  • Monitor for process execution anomalies where the web server spawns command interpreters
  • Review web server logs for sequential access patterns indicating webshell deployment followed by webshell access

How to Mitigate CVE-2019-25714

Immediate Actions Required

  • Restrict network access to the /seeyon/htmlofficeservlet endpoint using firewall rules or reverse proxy configurations
  • Deploy IPS/IDS signatures to detect and block exploitation attempts targeting this vulnerability
  • Audit the web root directory for any unexpected JSP files and remove any identified webshells
  • If possible, disable the vulnerable htmlofficeservlet functionality until a patch can be applied

Patch Information

Organizations running Seeyon OA A8 should consult the VulnCheck Advisory and vendor resources for the latest patch information. The Aliyun Security Notification may also contain relevant remediation guidance. Contact Seeyon directly for specific patch availability and upgrade instructions.

Workarounds

  • Block all external access to /seeyon/htmlofficeservlet at the network perimeter or reverse proxy
  • Implement strong authentication requirements for accessing the Seeyon OA application
  • Deploy a web application firewall with rules to detect base64-encoded webshell payloads
  • Run the web server process with minimal privileges to limit the impact of successful exploitation
bash
# Example: Block access to vulnerable endpoint using Apache mod_rewrite
# Add to Apache configuration or .htaccess file
<Location "/seeyon/htmlofficeservlet">
    Require all denied
</Location>

# Alternative: Use iptables to restrict access to specific trusted IPs
# iptables -A INPUT -p tcp --dport 80 -m string --string "/seeyon/htmlofficeservlet" --algo bm -j DROP

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechSeeyon

  • SeverityCRITICAL

  • CVSS Score9.3

  • EPSS Probability0.60%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-434
  • Technical References
  • SourceForge Product Overview

  • Aliyun Security Notification PDF

  • Archived Blog Post on Getshell

  • 96.mk OA Getshell Analysis

  • Broadcom Attack Signature Detail

  • Fortiguard IPS Vulnerability Description

  • VulnCheck Advisory on Seeyon OA A8
  • Related CVEs
  • CVE-2025-56451: Seeyon A8+ Collaborative XSS Vulnerability

  • CVE-2025-15446: Seeyon Zhiyuan OA SQLi Vulnerability

  • CVE-2025-15447: Seeyon Zhiyuan OA SQL Injection Flaw

  • CVE-2025-15427: Seeyon Zhiyuan OA SQLi Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English