Vulnerability Description
An authenticated attacker can inject malicious code into "lang" parameter in /uno/central.php file in CMSuno 1.6.2 and run this PHP code in the web page. In this way, attacker can takeover the control of the server.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cmsuno Project | Cmsuno | 1.6.2 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/161162/CMSUno-1.6.2-Remote-Code-Execution.hExploitThird Party AdvisoryVDB Entry
- https://fatihhcelik.blogspot.com/2020/09/cmsuno-162-remote-code-execution_30.htmExploitThird Party Advisory
- http://packetstormsecurity.com/files/161162/CMSUno-1.6.2-Remote-Code-Execution.hExploitThird Party AdvisoryVDB Entry
- https://fatihhcelik.blogspot.com/2020/09/cmsuno-162-remote-code-execution_30.htmExploitThird Party Advisory
FAQ
What is CVE-2020-25538?
CVE-2020-25538 is a vulnerability with a CVSS score of 8.8 (HIGH). An authenticated attacker can inject malicious code into "lang" parameter in /uno/central.php file in CMSuno 1.6.2 and run this PHP code in the web page. In this way, attacker can takeover the control...
How severe is CVE-2020-25538?
CVE-2020-25538 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-25538?
Check the references section above for vendor advisories and patch information. Affected products include: Cmsuno Project Cmsuno.