CVE-2026-7044
Received Received - Intake
Unrestricted File Upload in GreenCMS themeadd Function

Publication date: 2026-04-26

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was found in GreenCMS up to 2.3. Affected is the function themeadd of the file /index.php?m=admin&c=custom&a=themeadd. The manipulation results in unrestricted upload. The attack can be launched remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-26
Last Modified
2026-04-29
Generated
2026-05-06
AI Q&A
2026-04-27
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
greencms greencms to 2.3 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-434 The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in GreenCMS up to version 2.3, specifically in the function themeadd located in the file /index.php?m=admin&c=custom&a=themeadd. It allows an attacker to perform an unrestricted upload, meaning they can upload files without proper restrictions or validation.

The attack can be launched remotely, and the exploit has been made public, increasing the risk of exploitation.

It is important to note that this vulnerability affects only products that are no longer supported by the maintainer.


How can this vulnerability impact me? :

The unrestricted upload vulnerability can allow an attacker to upload malicious files to the affected system remotely.

This could lead to unauthorized access, data compromise, or further exploitation of the system depending on the nature of the uploaded files.

Since the vulnerability is exploitable remotely and the exploit is publicly available, the risk of attack is higher.


What immediate steps should I take to mitigate this vulnerability?

Since this vulnerability affects GreenCMS up to version 2.3 and the product is no longer supported by the maintainer, immediate mitigation steps include discontinuing use of the affected software or isolating it from untrusted networks.

Additionally, restricting access to the vulnerable function (themeadd in /index.php?m=admin&c=custom&a=themeadd) and monitoring for any unauthorized uploads can help reduce risk.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart