8.8
CVSSv3

CVE-2020-25538

Published: 13/11/2020 Updated: 21/07/2021
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

An authenticated attacker can inject malicious code into "lang" parameter in /uno/central.php file in CMSuno 1.6.2 and run this PHP code in the web page. In this way, attacker can takeover the control of the server.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cmsuno project cmsuno 1.6.2

Exploits

CMSUno version 162 authenticated remote code execution exploit The original discovery for the vulnerability leveraged is attributed to Fatih Celik in November of 2020 ...

Github Repositories

CMSUno 1.6.1 <= 1.6.2 - Remote Code Execution (Authenticated)

CMSUno RCE exploit CMSUno 161 &lt;= 162 - Remote Code Execution (Authenticated) Exploit for CVE-2020-25557 and CVE-2020-25538 [EDB-49485] [PacketStorm] Usage $ ruby exploitrb --help CMSUno 161 &lt;= 162 - Remote Code Execution (Authenticated) Usage: exploitrb -r &lt;url&gt; -c &lt;cmd&gt; [-u &lt;username&gt;] [-p &lt;password