8.8
CVSSv3

CVE-2017-14521

Published: 26/01/2018 Updated: 26/04/2019
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 655
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

In WonderCMS 2.3.1, the upload functionality accepts random application extensions and leads to malicious File Upload.

Vulnerable Product Search on Vulmon Subscribe to Product

wondercms wondercms 2.3.0

wondercms wondercms 2.3.1

Exploits

Affected Code: public static function _uploadFile() { + - if ( ! wCMS::$loggedIn && ! isset($_FILES['uploadFile']) && ! isset($_REQUEST['token'])) return; + private static function uploadFileAction() - if (isset($_REQUEST['token']) && $_REQUEST['token'] == wCMS::_generateToken() && isset($_FILES['uploadFile'])) { ...