Description
A weakness has been identified in EyouCMS up to 1.7.1/5.0. Impacted is the function check_userinfo of the file Diyajax.php of the component Member Avatar Handler. Executing a manipulation of the argument viewfile can lead to unrestricted upload. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Problem types
Timeline
| 2026-01-17: | Advisory disclosed |
| 2026-01-17: | VulDB entry created |
| 2026-01-17: | VulDB entry last update |
Credits
nobb (VulDB User)
References
vuldb.com/?id.341699 (VDB-341699 | EyouCMS Member Avatar Diyajax.php check_userinfo unrestricted upload)
vuldb.com/?ctiid.341699 (VDB-341699 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.731540 (Submit #731540 | Hainan Zanzan Network Technology Co. Eyoucms <=1.7.1 causing code execution due to file inclusion)
github.com/...ausing code execution due to file inclusion.md
github.com/...ausing code execution due to file inclusion.md