Auxilium RateMyPet contains an unauthenticated arbitrary file upload vulnerability in upload_banners.php. The banner upload feature fails to validate file types or enforce authentication, allowing remote attackers to upload malicious PHP files. These files are stored in a web-accessible /banners/ directory and can be executed directly, resulting in remote code execution.
Metrics
Affected Vendors & Products
References
History
Mon, 11 Aug 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 11 Aug 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Auxilium RateMyPet contains an unauthenticated arbitrary file upload vulnerability in upload_banners.php. The banner upload feature fails to validate file types or enforce authentication, allowing remote attackers to upload malicious PHP files. These files are stored in a web-accessible /banners/ directory and can be executed directly, resulting in remote code execution. | |
Title | Auxilium RateMyPet Arbitrary File Upload RCE | |
Weaknesses | CWE-434 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-08-11T14:54:39.531Z
Updated: 2025-08-11T15:51:43.803Z
Reserved: 2025-08-07T19:15:24.955Z
Link: CVE-2012-10038

Updated: 2025-08-11T15:46:33.988Z

Status : Awaiting Analysis
Published: 2025-08-11T15:15:27.223
Modified: 2025-08-11T18:32:48.867
Link: CVE-2012-10038

No data.