CVE-2023-25655 – baserproject/basercms
Package
Manager: composer
Name: baserproject/basercms
Vulnerable Version: >=0 <4.7.5
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00254 pctl0.48526
Details
baserCMS allows any file to be uploaded There is a vulnerability that allows uploading any files to baserCMS. This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users. If you are eligible, please update to the new version as soon as possible. ### Target baserCMS 4.7.3 and earlier versions ### Vulnerability Malicious files may be uploaded in Upload File Management. ### Countermeasures Update to the latest version of baserCMS Please refer to the following page to reference for more information. https://basercms.net/security/JVN_61105618 ### Credits - Taisei Inoue@GMO Cybersecurity by Ierae, Inc. - Yusuke Akagi@Mitsui Bussan Secure Directions, Inc.
Metadata
Created: 2023-03-23T20:00:10Z
Modified: 2023-03-28T18:03:20Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/03/GHSA-mfvg-qwcw-qvc8/GHSA-mfvg-qwcw-qvc8.json
CWE IDs: ["CWE-434"]
Alternative ID: GHSA-mfvg-qwcw-qvc8
Finding: F027
Auto approve: 1