Home

Description

Auxilium RateMyPet contains an unauthenticated arbitrary file upload vulnerability in upload_banners.php. The banner upload feature fails to validate file types or enforce authentication, allowing remote attackers to upload malicious PHP files. These files are stored in a web-accessible /banners/ directory and can be executed directly, resulting in remote code execution.

PUBLISHED Reserved 2025-08-07 | Published 2025-08-11 | Updated 2025-08-11 | Assigner VulnCheck




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-434 Unrestricted Upload of File with Dangerous Type

Product status

Default status
unaffected

*
affected

Credits

DaOne finder

References

raw.githubusercontent.com/...ti/http/auxilium_upload_exec.rb exploit

www.exploit-db.com/exploits/21329 exploit

www.exploit-db.com/exploits/21836 exploit

web.archive.org/...31222419/http://www.auxiliumsoftware.com/

cve.org (CVE-2012-10038)

nvd.nist.gov (CVE-2012-10038)

Download JSON