A critical vulnerability in ShowDoc - a highly used management and documentary collaboration platform in China - has become more relevant because it is now being actively exploited in the real world. Identified as CVE-2025-0520 (also reported as CNVD-2020-26585), this failure has a CVSS score of 9.4 / 10, which classifies it as very high risk and suitable to allow serious intrusions when not corrected.
The problem lies in a case of unrestricted file loading: the application does not properly value extensions and allows you to upload malicious PHP files. With that vector, an attacker can place a web shell on the server and run code at a distance, getting control over the vulnerable instance. Previous investigations and technical notices had already indicated that the pre-2.8.7 versions were susceptible to this technique, and that the corresponding patch was introduced in the 2.8.7 version published in October 2020.

In October 2020 ShowDoc launched the correction, and since then the project has continued to evolve to the current branches (the stable version at the time of writing is 3.8.1). Still, according to the follow-up shared by Caitlin Condon, Vice President of Security Research at VulnCheck, vulnerability has been taken advantage of in attacks on the ground: an explosion was observed that left a web shell in a US-based honeypot that executed a vulnerable version of ShowDoc. This confirms that even if the failure is old, the attackers continue to search and exploit outdated instances.
Public data indicate that there are more than 2,000 ShowDoc instances accessible from the Internet, with a significant concentration in China. This picture explains why a known and patched vulnerability can remain dangerous: many deployments are not updated or remain exposed, which offers easy targets for malicious actors who take advantage of these so-called "N-day" failures - known vulnerabilities for which patch exists, but which are still in use in unupdated facilities.

For those who administer ShowDoc the recommendation is clear: to update the latest version as soon as possible. Update not only applies the arrangement for file loading, but reduces the attack surface against other technical failures discovered over time. In addition to updating the software, it is prudent to review records and contents in upload directories in search of PHP files or web shells, segregate the instances exposed to the Internet and apply perimeter controls such as web application firewalls (WAF) and lock rules. It is also appropriate to audit users and permissions, and to consider safe backup and incident response lists in case of intrusions.
If you want to see the technical reference of why this type of file loading is dangerous, OWASP maintains very useful documentation on risks associated with unchecked charges: OWASP - Unrestricted File Upload. For information on the ShowDoc project and its launches, see the public repository in GitHub: star7th / showdoc in GitHub. And for case monitoring and active exploitation analysis you may be interested in the VulnCheck page, from which details of the incident have been shared: VulnCheck. Finally, if you look for the official CVE tab, the NVD portal usually centralizes these entries: NVD - National Vulnerability Database.
This episode is a good reminder that the simple fact that there is a patch does not prevent a vulnerability from remaining dangerous: the management of updates, the visibility of the exposed instances and the basic practices of operational hardening are as important as the patch itself. If you administer ShowDoc or are in charge of an environment that uses it, don't leave an update for tomorrow that can avoid an intrusion today.
Related
More news on the same subject.

Safety alert Drug critical vulnerability of SQL injection in PostgreSQL requires immediate update
Drucal has published safety updates for a vulnerability qualified as "highly critical" which affects Drumal Core and allows an attacker to achieve arbitrary SQL injection in sit...

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...