Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gwv8-67p9-8v37

Опубликовано: 01 авг. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 9.3

Описание

An unauthenticated arbitrary file upload vulnerability exists in Havalite CMS version 1.1.7 (and possibly earlier) in the upload.php script. The application fails to enforce proper file extension validation and authentication checks, allowing remote attackers to upload malicious PHP files via a crafted multipart/form-data POST request. Once uploaded, the attacker can access the file directly under havalite/tmp/files/, resulting in remote code execution.

An unauthenticated arbitrary file upload vulnerability exists in Havalite CMS version 1.1.7 (and possibly earlier) in the upload.php script. The application fails to enforce proper file extension validation and authentication checks, allowing remote attackers to upload malicious PHP files via a crafted multipart/form-data POST request. Once uploaded, the attacker can access the file directly under havalite/tmp/files/, resulting in remote code execution.

EPSS

Процентиль: 99%
0.73481
Высокий

9.3 Critical

CVSS4

Дефекты

CWE-434

Связанные уязвимости

nvd
6 месяцев назад

An unauthenticated arbitrary file upload vulnerability exists in Havalite CMS version 1.1.7 (and possibly earlier) in the upload.php script. The application fails to enforce proper file extension validation and authentication checks, allowing remote attackers to upload malicious PHP files via a crafted multipart/form-data POST request. Once uploaded, the attacker can access the file directly under havalite/tmp/files/, resulting in remote code execution.

EPSS

Процентиль: 99%
0.73481
Высокий

9.3 Critical

CVSS4

Дефекты

CWE-434