| Titre | EmpireSoft EmpireCMS <= 8.0 Code Injection |
|---|
| Description | A remote code execution vulnerability exists in EmpireCMS <= 8.0. The vulnerability is located in the LoadInMod() function of e/class/moddofun.php. When importing a system model, the application only validates that the uploaded file has a .mod extension but saves it as a .php file and directly executes it via PHP's include() function without validating its content. This allows authenticated administrators to execute arbitrary PHP code on the server by uploading a malicious .mod file, leading to complete server compromise. |
|---|
| La source | ⚠️ https://note-hxlab.wetolink.com/share/y4W2T0DDkhlr |
|---|
| Utilisateur | gets (UID 71108) |
|---|
| Soumission | 22/12/2025 06:40 (il y a 4 mois) |
|---|
| Modérer | 01/01/2026 12:09 (10 days later) |
|---|
| Statut | Dupliqué |
|---|
| Entrée VulDB | 125158 [EmpireCMS 7.5 File Upload e/class/moddofun.php LoadInMod élévation de privilèges] |
|---|
| Points | 0 |
|---|