CVE-2026-7043
Unrestricted File Upload in GreenCMS pluginAddLocal Function
Publication date: 2026-04-26
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| greencms | greencms | to 2.3 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-434 | The product allows the upload or transfer of dangerous file types that are automatically processed within its environment. |
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in GreenCMS up to version 2.3, specifically in the function pluginAddLocal within the file /index.php?m=admin&c=custom&a=pluginadd. It allows an attacker to perform an unrestricted upload, meaning they can upload files without proper restrictions or validation.
The attack can be initiated remotely, and the exploit has been publicly disclosed. This vulnerability affects only versions of GreenCMS that are no longer supported by the maintainer.
How can this vulnerability impact me? :
The unrestricted upload vulnerability can allow an attacker to upload malicious files to the affected system remotely. This could lead to unauthorized code execution, data compromise, or further exploitation of the system.
Since the vulnerability affects unsupported versions of GreenCMS, there may be no official patches or fixes available, increasing the risk if the system remains unpatched.