CVE-2026-35047
Unrestricted File Upload in BraveCMS CKEditor Enables RCE
Publication date: 2026-04-06
Last updated on: 2026-04-10
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ajax30 | bravecms | From 2.0.0 (inc) to 2.0.6 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-434 | The product allows the upload or transfer of dangerous file types that are automatically processed within its environment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-35047 is an Unrestricted File Upload vulnerability in BraveCMS versions prior to 2.0.6, specifically in the CKEditor upload endpoint.
This flaw allows attackers to upload arbitrary files, including executable scripts, to the server.
Successful exploitation can lead to Remote Code Execution (RCE), which means attackers can run malicious code on the server.
This can result in full system compromise, data theft, or disruption of services.
The vulnerability was fixed in BraveCMS version 2.0.6.
How can this vulnerability impact me? :
If you are running a vulnerable version of BraveCMS (2.0.0 through 2.0.5), this vulnerability can have severe impacts.
- Attackers can upload malicious files, including executable scripts.
- This can lead to Remote Code Execution (RCE) on your server.
- Potential consequences include full system compromise, allowing attackers to control your server.
- Data exfiltration, meaning sensitive data could be stolen.
- Service disruption, causing downtime or loss of availability.
To mitigate these risks, it is strongly recommended to upgrade to BraveCMS version 2.0.6 or later.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection of this vulnerability involves monitoring the CKEditor upload endpoint for attempts to upload arbitrary or executable files, which should normally be restricted to image files only.
You can check your server logs for unusual file upload activity, especially uploads with suspicious file extensions or MIME types that are not allowed (anything other than jpg, jpeg, png, webp).
Commands to help detect suspicious uploads might include:
- Using grep to find suspicious file uploads in web server logs, e.g., `grep -iE "\.php|\.exe|\.sh" /var/log/apache2/access.log`
- Listing recently uploaded files in the CKEditor upload directory and checking their extensions and permissions, e.g., `ls -l /path/to/public/images/articles`
- Using file command to verify MIME types of uploaded files, e.g., `file /path/to/public/images/articles/*`
- Monitoring for unexpected execution or access patterns via tools like `tail -f /var/log/apache2/error.log` or application logs.
What immediate steps should I take to mitigate this vulnerability?
The primary immediate mitigation is to upgrade BraveCMS to version 2.0.6 or later, where this vulnerability is fixed.
If upgrading immediately is not possible, you should:
- Restrict access to the CKEditor upload endpoint to trusted users only.
- Enforce strict server-side validation of uploaded files by checking allowed MIME types (jpg, jpeg, png, webp) and file extensions.
- Disable execution permissions on the directory where files are uploaded to prevent execution of malicious scripts.
- Regularly monitor and remove any suspicious or unauthorized uploaded files.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability in BraveCMS allows attackers to upload arbitrary files, including executable scripts, which can lead to Remote Code Execution (RCE), full system compromise, data exfiltration, or service disruption.
Such outcomes can negatively impact compliance with common standards and regulations like GDPR and HIPAA, as these require protection of personal and sensitive data against unauthorized access and breaches.
Specifically, data exfiltration resulting from this vulnerability could lead to unauthorized disclosure of personal or protected health information, violating confidentiality and data protection requirements.
Therefore, organizations using affected versions of BraveCMS without applying the patch or mitigations risk non-compliance with these regulations due to potential data breaches and inadequate security controls.