An arbitrary code execution vulnerability in Badaso CMS 2.9.11. The Media Manager allows authenticated users to upload files containing embedded PHP code via the file-upload endpoint, bypassing content-type validation. When such a file is accessed via its URL, the server executes the PHP payload, enabling an attacker to run arbitrary system commands and achieve full compromise of the underlying host. This has been demonstrated by embedding a backdoor within a PDF and renaming it with a .php extension.
History

Wed, 27 Aug 2025 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-94
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 27 Aug 2025 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Uatech
Uatech badaso
Vendors & Products Uatech
Uatech badaso

Tue, 26 Aug 2025 20:00:00 +0000

Type Values Removed Values Added
Description An arbitrary code execution vulnerability in Badaso CMS 2.9.11. The Media Manager allows authenticated users to upload files containing embedded PHP code via the file-upload endpoint, bypassing content-type validation. When such a file is accessed via its URL, the server executes the PHP payload, enabling an attacker to run arbitrary system commands and achieve full compromise of the underlying host. This has been demonstrated by embedding a backdoor within a PDF and renaming it with a .php extension.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-08-26T00:00:00.000Z

Updated: 2025-08-27T14:02:57.320Z

Reserved: 2025-06-16T00:00:00.000Z

Link: CVE-2025-52353

cve-icon Vulnrichment

Updated: 2025-08-27T14:02:51.676Z

cve-icon NVD

Status : Received

Published: 2025-08-26T20:15:40.460

Modified: 2025-08-27T14:15:53.593

Link: CVE-2025-52353

cve-icon Redhat

No data.