8.8
CVSSv3

CVE-2020-25557

Published: 13/11/2020 Updated: 21/07/2021
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

In CMSuno 1.6.2, an attacker can inject malicious PHP code as a "username" while changing his/her username & password. After that, when attacker logs in to the application, attacker's code will be run. As a result of this vulnerability, authenticated user can run command on the server.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cmsuno project cmsuno 1.6.2

Exploits

CMSUno version 162 authenticated remote code execution exploit The original discovery for the vulnerability leveraged is attributed to Fatih Celik in November of 2020 ...

Github Repositories

CMSUno 1.6.1 <= 1.6.2 - Remote Code Execution (Authenticated)

CMSUno RCE exploit CMSUno 161 &lt;= 162 - Remote Code Execution (Authenticated) Exploit for CVE-2020-25557 and CVE-2020-25538 [EDB-49485] [PacketStorm] Usage $ ruby exploitrb --help CMSUno 161 &lt;= 162 - Remote Code Execution (Authenticated) Usage: exploitrb -r &lt;url&gt; -c &lt;cmd&gt; [-u &lt;username&gt;] [-p &lt;password