Home

Description

Aero CMS 0.0.1 contains a PHP code injection vulnerability that allows authenticated attackers to execute arbitrary PHP code by uploading malicious files through the image parameter. Attackers can upload PHP files with embedded code to the admin posts.php endpoint with source=add_post parameter, and the uploaded files are executed by the server.

PUBLISHED Reserved 2026-01-11 | Published 2026-05-10 | Updated 2026-05-10 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

Improper Control of Generation of Code ('Code Injection')

Product status

0.0.1
affected

Credits

Hubert Wojciechowski finder

References

www.exploit-db.com/exploits/51085 (ExploitDB-51085) exploit

github.com/MegaTKC/AeroCMS (Official Product Homepage) product

www.vulncheck.com/...ro-cms-php-code-injection-via-posts-php (VulnCheck Advisory: Aero CMS 0.0.1 PHP Code Injection via posts.php) third-party-advisory

cve.org (CVE-2022-50944)

nvd.nist.gov (CVE-2022-50944)

Download JSON