Home

Description

Due to client-controlled permission check parameter, PAD CMS's file upload functionality allows an unauthenticated remote attacker to upload files of any type and extension without restriction, which can then be executed leading to Remote Code Execution. This issue affects all 3 templates: www, bip and ww+bip. This product is End-Of-Life and producent will not publish patches for this vulnerability.

PUBLISHED Reserved 2025-07-04 | Published 2025-09-30 | Updated 2025-09-30 | Assigner CERT-PL




CRITICAL: 10.0CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem types

CWE-434 Unrestricted Upload of File with Dangerous Type

Product status

Default status
affected

Any version
affected

Credits

Kamil Szczurowski finder

Robert Kruczek finder

References

cert.pl/posts/2025/09/CVE-2025-7063

cve.org (CVE-2025-7063)

nvd.nist.gov (CVE-2025-7063)

Download JSON