osCommerce versions up to and including 2.2 RC2a contain a vulnerability in its administrative file manager utility (admin/file_manager.php). The interface allows file uploads and edits without sufficient input validation or access control. An unauthenticated attacker can craft a POST request to upload a .php file containing arbitrary code, which is then executed by the server.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 16 Sep 2025 14:45:00 +0000

Type Values Removed Values Added
Description osCommerce versions up to and including 2.2 RC2a contain a vulnerability in its administrative file manager utility (admin/file_manager.php). The interface allows file uploads and edits without sufficient input validation or access control. An unauthenticated attacker can craft a POST request to upload a .php file containing arbitrary code, which is then executed by the server.
Title osCommerce <= 2.2 Admin File Manager Arbitrary PHP Code Execution
Weaknesses CWE-434
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-09-16T14:33:40.335Z

Reserved: 2025-08-27T18:34:34.964Z

Link: CVE-2009-20006

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-09-16T15:15:41.953

Modified: 2025-09-16T15:15:41.953

Link: CVE-2009-20006

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.