QaTraq 6.9.2 allows authenticated users to upload arbitrary files via the "Add Attachment" feature in the "Test Script" module. The application fails to restrict file types, enabling the upload of executable PHP files. Once uploaded, the file can be accessed through the "View Attachment" option, which executes the PHP payload on the server.
References
| Link | Resource |
|---|---|
| http://qatraq.com | Broken Link |
| https://bitsbyamg.com/blog/post/2025/10/19/qatraq-692-default-creds-and-file-upload-rce | Exploit Third Party Advisory |
Configurations
History
26 Nov 2025, 15:49
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:testmanagement:qatraq:6.9.2:*:*:*:*:*:*:* | |
| References | () http://qatraq.com - Broken Link | |
| References | () https://bitsbyamg.com/blog/post/2025/10/19/qatraq-692-default-creds-and-file-upload-rce - Exploit, Third Party Advisory | |
| First Time |
Testmanagement
Testmanagement qatraq |
17 Nov 2025, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
| CWE | CWE-434 |
17 Nov 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-17 16:15
Updated : 2025-11-26 15:49
NVD link : CVE-2025-63748
Mitre link : CVE-2025-63748
CVE.ORG link : CVE-2025-63748
JSON object : View
Products Affected
testmanagement
- qatraq
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
