Home

Description

2-Plan Team 1.0.4 contains an arbitrary file upload vulnerability that allows authenticated attackers to upload executable PHP files by sending multipart form data to managefile.php. Attackers can upload PHP files through the userfile1 parameter with action=upload, which are stored in the files directory and executed by the web server for remote code execution.

PUBLISHED Reserved 2026-03-06 | Published 2026-03-06 | Updated 2026-03-09 | Assigner VulnCheck




HIGH: 7.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Problem types

Unrestricted Upload of File with Dangerous Type

Product status

1.0.4
affected

Credits

Ihsan Sencan finder

References

www.exploit-db.com/exploits/45878 (ExploitDB-45878) exploit

www.vulncheck.com/...arbitrary-file-upload-via-managefilephp (VulnCheck Advisory: 2-Plan Team 1.0.4 Arbitrary File Upload via managefile.php) third-party-advisory

cve.org (CVE-2018-25162)

nvd.nist.gov (CVE-2018-25162)

Download JSON