Submit #798530: https://github.com/GreenCMS/GreenCMS GreenCMS v2.3 arbitrary file deletioninfo

Titlehttps://github.com/GreenCMS/GreenCMS GreenCMS v2.3 arbitrary file deletion
DescriptionThe /CustomController.class.php file in greencms v2.3 contains an arbitrary file upload vulnerability.This flaw arises from the theme addition feature (access path: index.php?m=admin&c=custom&a=themeadd) failing to properly validate and filter uploaded files. Attackers can upload compressed files containing webshells, which the system automatically decompresses into the website's root directory. Subsequently, tools like Godzilla can exploit these webshells to gain server control, resulting in severe security risks such as data breaches and malicious operations, posing significant threats to system security.
Source⚠️ https://github.com/ueh1013/VULN/issues/21
User
 R21Z20 (UID 97129)
Submission04/07/2026 05:53 (20 days ago)
Moderation04/25/2026 18:01 (19 days later)
StatusAccepted
VulDB entry359623 [GreenCMS up to 2.3 index.php?m=admin&c=custom&a=themeadd unrestricted upload]
Points20

Want to know what is going to be exploited?

We predict KEV entries!