A vulnerability classified as critical has been found in ChestnutCMS up to 1.5.2. This affects the function uploadFile of the file /dev-api/cms/file/upload. The manipulation of the argument file leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://github.com/IceFoxH/VULN/issues/6 | Exploit |
https://vuldb.com/?ctiid.298773 | Permissions Required VDB Entry |
https://vuldb.com/?id.298773 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.512029 | Third Party Advisory VDB Entry |
https://github.com/IceFoxH/VULN/issues/6 | Exploit |
Configurations
History
12 May 2025, 20:56
Type | Values Removed | Values Added |
---|---|---|
First Time |
1000mz chestnutcms
1000mz |
|
References | () https://github.com/IceFoxH/VULN/issues/6 - Exploit | |
References | () https://vuldb.com/?ctiid.298773 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.298773 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.512029 - Third Party Advisory, VDB Entry | |
Summary |
|
|
CWE | CWE-79 | |
CPE | cpe:2.3:a:1000mz:chestnutcms:1.5.2:*:*:*:*:*:*:* |
06 Mar 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/IceFoxH/VULN/issues/6 - |
06 Mar 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-06 16:15
Updated : 2025-05-12 20:56
NVD link : CVE-2025-2031
Mitre link : CVE-2025-2031
CVE.ORG link : CVE-2025-2031
JSON object : View
Products Affected
1000mz
- chestnutcms