Glossword versions 1.8.8 through 1.8.12 contain an authenticated arbitrary file upload vulnerability. When deployed as a standalone application, the administrative interface (gw_admin.php) allows users with administrator privileges to upload files to the gw_temp/a/ directory. Due to insufficient validation of file type and path, attackers can upload and execute PHP payloads, resulting in remote code execution.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 07 Aug 2025 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Glossword
Glossword glossword
Vendors & Products Glossword
Glossword glossword

Wed, 06 Aug 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 05 Aug 2025 20:15:00 +0000

Type Values Removed Values Added
Description Glossword versions 1.8.8 through 1.8.12 contain an authenticated arbitrary file upload vulnerability. When deployed as a standalone application, the administrative interface (gw_admin.php) allows users with administrator privileges to upload files to the gw_temp/a/ directory. Due to insufficient validation of file type and path, attackers can upload and execute PHP payloads, resulting in remote code execution.
Title Glossword 1.8.8 - 1.8.12 Arbitrary File Upload RCE
Weaknesses CWE-434
References
Metrics cvssV4_0

{'score': 9.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-08-06T17:57:27.779Z

Reserved: 2025-08-05T14:30:38.272Z

Link: CVE-2013-10067

cve-icon Vulnrichment

Updated: 2025-08-06T17:57:24.139Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-05T20:15:35.387

Modified: 2025-08-06T18:15:28.427

Link: CVE-2013-10067

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-08-06T15:12:47Z