Home

Description

Maho is a free and open source ecommerce platform. In Maho prior to 25.9.0, an authenticated staff user with access to the `Dashboard` and `Catalog\Manage Products` permissions can create a custom option on a listing with a file input field. By allowing file uploads with a `.php` extension, the user can use the filed to upload malicious PHP files, gaining remote code execution. Version 25.9.0 fixes the issue.

PUBLISHED Reserved 2025-09-01 | Published 2025-09-08 | Updated 2025-09-09 | Assigner GitHub_M




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem types

CWE-646: Reliance on File Name or Extension of Externally-Supplied File

Product status

< 25.9.0
affected

References

github.com/...e/maho/security/advisories/GHSA-vgmm-27fc-vmgp

github.com/...ommit/db54a1b44e9b3fd26b27ca4d5ece0af99c4dcb53

cve.org (CVE-2025-58449)

nvd.nist.gov (CVE-2025-58449)

Download JSON