We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
An unauthenticated arbitrary file upload vulnerability exists in Havalite CMS version 1.1.7 (and possibly earlier) in the upload.php script. The application fails to enforce proper file extension validation and authentication checks, allowing remote attackers to upload malicious PHP files via a crafted multipart/form-data POST request. Once uploaded, the attacker can access the file directly under havalite/tmp/files/, resulting in remote code execution.
Reserved 2025-08-01 | Published 2025-08-01 | Updated 2025-08-01 | Assigner VulnCheckCWE-434 Unrestricted Upload of File with Dangerous Type
CWH
sinn3r
raw.githubusercontent.com/.../webapp/havalite_upload_exec.rb
www.exploit-db.com/exploits/26243
sourceforge.net/projects/havalite/
www.vulncheck.com/...s/havalite-cms-arbitary-file-upload-rce
Support options