| Titre | rickxy Hospital-Management-System 1.0 Unrestricted Upload |
|---|
| Description | A critical arbitrary file upload vulnerability was discovered in the "/backend/admin/his_admin_account.php" file of rickxy Hospital-Management-System v1.0. Unauthenticated attackers can craft a direct profile update POST request and inject a malicious PHP payload (e.g., webshell) instead of an image via the "ad_dpic" parameter. The uploaded shell can then be directly accessed and executed by navigating to the upload directory. This leads to Remote Code Execution (RCE), comprehensive system control, unauthorized database access, and potential server takeover. Exploitation requires no authentication or prior access to the system. |
|---|
| La source | ⚠️ https://github.com/freeloader9527/cve/issues/2 |
|---|
| Utilisateur | wacool (UID 72886) |
|---|
| Soumission | 28/03/2026 18:28 (il y a 26 jours) |
|---|
| Modérer | 19/04/2026 16:04 (22 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 358237 [rickxy Hospital Management System his_admin_account.php ad_dpic élévation de privilèges] |
|---|
| Points | 20 |
|---|