logo

CVE-2023-25655 baserproject/basercms

Package

Manager: composer
Name: baserproject/basercms
Vulnerable Version: >=0 <4.7.5

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00254 pctl0.48526

Details

baserCMS allows any file to be uploaded There is a vulnerability that allows uploading any files to baserCMS. This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users. If you are eligible, please update to the new version as soon as possible. ### Target baserCMS 4.7.3 and earlier versions ### Vulnerability Malicious files may be uploaded in Upload File Management. ### Countermeasures Update to the latest version of baserCMS Please refer to the following page to reference for more information. https://basercms.net/security/JVN_61105618 ### Credits - Taisei Inoue@GMO Cybersecurity by Ierae, Inc. - Yusuke Akagi@Mitsui Bussan Secure Directions, Inc.

Metadata

Created: 2023-03-23T20:00:10Z
Modified: 2023-03-28T18:03:20Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/03/GHSA-mfvg-qwcw-qvc8/GHSA-mfvg-qwcw-qvc8.json
CWE IDs: ["CWE-434"]
Alternative ID: GHSA-mfvg-qwcw-qvc8
Finding: F027
Auto approve: 1