Vulnerability Description
A weakness has been identified in EyouCMS up to 1.7.1/5.0. Impacted is the function check_userinfo of the file Diyajax.php of the component Member Avatar Handler. Executing a manipulation of the argument viewfile can lead to unrestricted upload. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Eyoucms | Eyoucms | 1.7.0 |
Related Weaknesses (CWE)
References
- https://github.com/24-2021/vul3/blob/main/Eyoucms/Eyoucms%3D1.7.1%20check_userinBroken Link
- https://github.com/24-2021/vul3/blob/main/Eyoucms/Eyoucms%3D1.7.1%20check_userinBroken Link
- https://vuldb.com/?ctiid.341699Permissions RequiredVDB Entry
- https://vuldb.com/?id.341699Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.731540Third Party AdvisoryVDB Entry
FAQ
What is CVE-2026-1107?
CVE-2026-1107 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A weakness has been identified in EyouCMS up to 1.7.1/5.0. Impacted is the function check_userinfo of the file Diyajax.php of the component Member Avatar Handler. Executing a manipulation of the argum...
How severe is CVE-2026-1107?
CVE-2026-1107 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-1107?
Check the references section above for vendor advisories and patch information. Affected products include: Eyoucms Eyoucms.