We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
An unauthenticated arbitrary file upload vulnerability exists in LibrettoCMS version 1.1.7 (and possibly earlier) contains an unauthenticated arbitrary file upload vulnerability in its File Manager plugin. The upload handler located at adm/ui/js/ckeditor/plugins/pgrfilemanager/php/upload.php fails to properly validate file extensions, allowing attackers to upload files with misleading extensions and subsequently rename them to executable .php scripts. This enables remote code execution on the server without authentication.
Reserved 2025-08-01 | Published 2025-08-04 | Updated 2025-08-04 | Assigner VulnCheckCWE-434 Unrestricted Upload of File with Dangerous Type
CWH
sinn3r
raw.githubusercontent.com/.../webapp/libretto_upload_exec.rb
www.exploit-db.com/exploits/26213
www.exploit-db.com/exploits/26421
sourceforge.net/projects/librettocms/
www.vulncheck.com/...ocms-file-manager-arbitrary-file-upload
Support options