CVE-2026-7393
Received Received - Intake
Unrestricted File Upload in Pizzafy Ecommerce System

Publication date: 2026-04-29

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was found in SourceCodester Pizzafy Ecommerce System 1.0. Affected is the function save_menu of the file /admin/admin_class_novo.php of the component File Extension Handler. Performing a manipulation of the argument img results in unrestricted upload. The attack is possible to be carried out remotely. The exploit has been made public and could be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-29
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-04-29
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
sourcecodester pizzafy_ecommerce_system 1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-434 The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the SourceCodester Pizzafy Ecommerce System 1.0, specifically in the save_menu function of the /admin/admin_class_novo.php file within the File Extension Handler component.

It allows an attacker to manipulate the 'img' argument to perform an unrestricted file upload.

The attack can be carried out remotely, and an exploit for this vulnerability has been made public.


How can this vulnerability impact me? :

The vulnerability allows an attacker to upload files without restriction, which could lead to unauthorized files being placed on the server.

This could potentially be exploited to execute malicious code, compromise the server, or disrupt the ecommerce system's normal operation.


Can you explain this vulnerability to me?

CVE-2026-7393 is a vulnerability in the Pizzafy Ecommerce System 1.0, specifically in the save_menu() function of the admin_class_novo.php file. This function allows authenticated administrators to upload files without properly validating the file type, leading to an unrestricted file upload flaw.

Attackers can exploit this by uploading malicious PHP webshells disguised as images to the web-accessible assets/img/ directory. Because directory listing is enabled, these files can be easily found and accessed.

Once uploaded, the attacker can execute arbitrary operating system commands on the server by accessing the webshell through a crafted URL, potentially leading to full system compromise.


How can this vulnerability impact me? :

This vulnerability can have severe impacts including full system compromise. An attacker with administrator privileges can upload a malicious webshell and execute arbitrary commands on the server.

  • Reading sensitive files such as database credentials.
  • Executing further malicious commands on the server.
  • Establishing persistent access through reverse shells.

How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking for the presence of unauthorized or suspicious files in the web-accessible assets/img/ directory, especially PHP files disguised as images.

You can also monitor for unusual HTTP requests that attempt to execute commands via the cmd parameter in URLs targeting uploaded files.

Suggested commands to detect potential exploitation include:

  • List files in the assets/img/ directory to find unexpected PHP files: ls -la /path/to/assets/img/
  • Search for PHP files in the image directory: find /path/to/assets/img/ -type f -name "*.php"
  • Check web server access logs for requests containing the cmd parameter: grep "cmd=" /var/log/apache2/access.log
  • Use network monitoring tools to detect suspicious HTTP requests targeting the upload endpoint or uploaded files.

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting file uploads to only allow safe file types and validating file extensions and MIME types in the save_menu() function.

Disable directory listing on the assets/img/ directory to prevent attackers from easily locating uploaded files.

Remove any suspicious or unauthorized files found in the assets/img/ directory, especially PHP files.

Apply proper access controls to the upload functionality to ensure only trusted administrators can upload files.

Monitor server logs for signs of exploitation attempts and consider temporarily disabling the vulnerable upload feature until a patch is applied.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows an attacker with administrator privileges to upload malicious files and execute arbitrary commands on the server, potentially leading to full system compromise.

Such a compromise can result in unauthorized access to sensitive data, including database credentials and other protected information.

This exposure and potential data breach could violate common standards and regulations like GDPR and HIPAA, which require protection of personal and sensitive data against unauthorized access and breaches.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking for the presence of unauthorized or suspicious PHP files in the web-accessible assets/img/ directory, as the unrestricted file upload allows malicious PHP webshells to be uploaded disguised as images.

You can also monitor web server logs for unusual requests to files in the assets/img/ directory, especially those containing parameters like cmd that indicate command execution attempts.

Suggested commands to detect exploitation attempts or presence of malicious files include:

  • Find suspicious PHP files in the upload directory: `find /path/to/webroot/assets/img/ -name '*.php'`
  • Check web server access logs for requests with cmd parameter: `grep 'cmd=' /var/log/apache2/access.log` (adjust path to your web server logs)
  • List recently modified or created files in the upload directory: `ls -lt /path/to/webroot/assets/img/`

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting or disabling the file upload functionality in the affected save_menu() function until a patch is applied.

Implement strict validation on uploaded files to ensure only allowed image types are accepted and block any executable files such as PHP scripts.

Remove any suspicious or unauthorized PHP files found in the assets/img/ directory to prevent remote code execution.

Disable directory listing on the web server to prevent attackers from easily locating uploaded files.

Monitor and restrict administrator access to trusted users only, as the vulnerability requires administrator privileges to exploit.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart