PHP Volunteer Management System v1.0.2 contains an arbitrary file upload vulnerability in its document upload functionality. Authenticated users can upload files to the mods/documents/uploads/ directory without any restriction on file type or extension. Because this directory is publicly accessible and lacks execution controls, attackers can upload a malicious PHP payload and execute it remotely. The application ships with default credentials, making exploitation trivial. Once authenticated, the attacker can upload a PHP shell and trigger it via a direct GET request.
CVSS
No CVSS.
References
Configurations
No configuration.
History
14 Aug 2025, 13:11
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
13 Aug 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-13 21:15
Updated : 2025-08-14 13:11
NVD link : CVE-2012-10056
Mitre link : CVE-2012-10056
CVE.ORG link : CVE-2012-10056
JSON object : View
Products Affected
No product.
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type