| Title | EmpireSoft EmpireCMS <= 8.0 Code Injection |
|---|
| Description | A remote code execution vulnerability exists in EmpireCMS <= 8.0. The vulnerability is located in the LoadInMod() function of e/class/moddofun.php. When importing a system model, the application only validates that the uploaded file has a .mod extension but saves it as a .php file and directly executes it via PHP's include() function without validating its content. This allows authenticated administrators to execute arbitrary PHP code on the server by uploading a malicious .mod file, leading to complete server compromise. |
|---|
| Source | ⚠️ https://note-hxlab.wetolink.com/share/y4W2T0DDkhlr |
|---|
| User | gets (UID 71108) |
|---|
| Submission | 12/22/2025 06:40 (4 months ago) |
|---|
| Moderation | 01/01/2026 12:09 (10 days later) |
|---|
| Status | Duplicate |
|---|
| VulDB entry | 125158 [EmpireCMS 7.5 File Upload e/class/moddofun.php LoadInMod unrestricted upload] |
|---|
| Points | 0 |
|---|