CVE-2012-10050
BaseFortify
Publication date: 2025-08-08
Last updated on: 2025-08-08
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| cuteflow | cuteflow | 2.11.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-434 | The product allows the upload or transfer of dangerous file types that are automatically processed within its environment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in CuteFlow version 2.11.2 and earlier, where the restart_circulation_values_write.php script allows unauthenticated attackers to upload arbitrary PHP files without validating or restricting the file types. These uploaded files are stored in the upload/___1/ directory and can be accessed via the web server, enabling attackers to execute remote code on the server.
How can this vulnerability impact me? :
The vulnerability can allow attackers to execute arbitrary code remotely on the affected server, potentially leading to full system compromise, unauthorized access to sensitive data, disruption of services, and further exploitation of the network.