CVE-2012-10049
BaseFortify
Publication date: 2025-08-08
Last updated on: 2025-08-08
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| webpagetest | webpagetest | 2.6 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-434 | The product allows the upload or transfer of dangerous file types that are automatically processed within its environment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in WebPageTest version 2.6 and earlier, where the resultimage.php script allows arbitrary file uploads without validating or sanitizing user input. This means an attacker can upload malicious PHP code to a publicly accessible directory, enabling them to execute that code remotely on the web server.
How can this vulnerability impact me? :
The vulnerability can lead to full remote code execution on the web server, allowing attackers to run arbitrary commands or scripts. This can compromise the server, lead to data theft, service disruption, or further attacks within the network.