Home

Description

Koken CMS 0.22.24 contains a file upload vulnerability that allows authenticated attackers to bypass file extension restrictions by renaming malicious PHP files. Attackers can upload PHP files with system command execution capabilities by manipulating the file upload request through a web proxy and changing the file extension.

PUBLISHED Reserved 2026-01-28 | Published 2026-01-30 | Updated 2026-02-03 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

Unrestricted Upload of File with Dangerous Type

Product status

0.22.24
affected

Credits

v1n1v131r4 finder

References

www.exploit-db.com/exploits/48706 (ExploitDB-48706) exploit

koken.me/ (Koken CMS Official Homepage) product

www.softaculous.com/apps/cms/Koken (Softaculous Koken CMS Software Page) product

github.com/...File-Upload-on-Koken-CMS/blob/master/README.md (Researcher PoC) technical-description exploit

www.vulncheck.com/advisories/koken-cms-arbitrary-file-upload (VulnCheck Advisory: Koken CMS 0.22.24 - Arbitrary File Upload) third-party-advisory

cve.org (CVE-2020-37023)

nvd.nist.gov (CVE-2020-37023)

Download JSON