Description
PHP Volunteer Management System v1.0.2 contains an arbitrary file upload vulnerability in its document upload functionality. Authenticated users can upload files to the mods/documents/uploads/ directory without any restriction on file type or extension. Because this directory is publicly accessible and lacks execution controls, attackers can upload a malicious PHP payload and execute it remotely. The application ships with default credentials, making exploitation trivial. Once authenticated, the attacker can upload a PHP shell and trigger it via a direct GET request.
Published: 2025-08-13
Score: 8.7 High
EPSS: 32.8% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2012-6603 PHP Volunteer Management System v1.0.2 contains an arbitrary file upload vulnerability in its document upload functionality. Authenticated users can upload files to the mods/documents/uploads/ directory without any restriction on file type or extension. Because this directory is publicly accessible and lacks execution controls, attackers can upload a malicious PHP payload and execute it remotely. The application ships with default credentials, making exploitation trivial. Once authenticated, the attacker can upload a PHP shell and trigger it via a direct GET request.
History

Thu, 05 Mar 2026 12:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:shawn_bradley:php_volunteer_management:1.0.2:*:*:*:*:*:*:*
Vendors & Products Shawn Bradley
Shawn Bradley php Volunteer Management

Thu, 05 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
First Time appeared Shawn Bradley
Shawn Bradley php Volunteer Management
CPEs cpe:2.3:a:shawn_bradley:php_volunteer_management:1.0.2:*:*:*:*:*:*:*
Vendors & Products Shawn Bradley
Shawn Bradley php Volunteer Management

Thu, 14 Aug 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 13 Aug 2025 21:00:00 +0000

Type Values Removed Values Added
Description PHP Volunteer Management System v1.0.2 contains an arbitrary file upload vulnerability in its document upload functionality. Authenticated users can upload files to the mods/documents/uploads/ directory without any restriction on file type or extension. Because this directory is publicly accessible and lacks execution controls, attackers can upload a malicious PHP payload and execute it remotely. The application ships with default credentials, making exploitation trivial. Once authenticated, the attacker can upload a PHP shell and trigger it via a direct GET request.
Title PHP Volunteer Management System 1.0.2 Arbitrary File Upload
Weaknesses CWE-434
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-07T14:02:49.145Z

Reserved: 2025-08-11T18:35:06.637Z

Link: CVE-2012-10056

cve-icon Vulnrichment

Updated: 2025-08-14T13:46:42.536Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-13T21:15:29.997

Modified: 2025-08-14T13:11:53.633

Link: CVE-2012-10056

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses