Description
Snews CMS 1.7 contains an unrestricted file upload vulnerability that allows unauthenticated attackers to upload arbitrary files including PHP executables to the snews_files directory. Attackers can upload malicious PHP files through the multipart form-data upload endpoint and execute them by accessing the uploaded file path to achieve remote code execution.
Published: 2026-04-04
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

Snews CMS version 1.7 is vulnerable to an unrestricted file upload flaw that permits attackers to upload any file, including PHP executables, to the snews_files directory through a multipart form-data endpoint. Once an attacker uploads a malicious PHP script, they can trigger its execution by navigating to the file’s URL, thereby gaining complete remote code execution on the host. This vulnerability directly compromises confidentiality, integrity, and availability by allowing arbitrary code to run with the privileges of the web application process.

Affected Systems

The flaw affects the Snewscms product known as Snews CMS, specifically version 1.7. No other versions are listed as impacted, and the issue centers on the snews_files upload path within the application.

Risk and Exploitability

The CVSS score of 9.3 marks it as a critical vulnerability, while the EPSS score of less than 1% suggests a low likelihood of widespread exploitation at present. It is not included in CISA’s KEV catalog, indicating no known large‑scale attacks at the time of reporting. The attack vector is inferred to be unauthenticated, HTTP‑based requests to the web server performing the file upload, as the description indicates direct access to the upload endpoint without authentication. The vulnerability can be exploited by any entity that can reach the exposed upload URL.

Generated by OpenCVE AI on April 14, 2026 at 21:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Snews CMS to a version where the unrestricted file upload issue is resolved. If no patch is available, configure the web server to deny execution of PHP files in the snews_files directory, for example by setting "AddHandler cgi-script" restrictions or using .htaccess to block PHP execution. Disable the upload functionality or move the upload directory outside the webroot if the application allows; otherwise, restrict permissions so that only the server can write to the directory. Monitor web server logs for unusual file uploads and for indications of remote code execution attempts. Ensure that the application runs under the least privilege necessary and consider applying a web application firewall rule to block HTTP POST requests that include PHP code in the payload.

Generated by OpenCVE AI on April 14, 2026 at 21:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:snewscms:snews:*:*:*:*:*:*:*:*

Mon, 06 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 04 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description Snews CMS 1.7 contains an unrestricted file upload vulnerability that allows unauthenticated attackers to upload arbitrary files including PHP executables to the snews_files directory. Attackers can upload malicious PHP files through the multipart form-data upload endpoint and execute them by accessing the uploaded file path to achieve remote code execution.
Title Snews CMS 1.7 Unrestricted File Upload via snews_files
First Time appeared Snewscms
Snewscms snews
Weaknesses CWE-434
CPEs cpe:2.3:a:snewscms:snews:1.7:*:*:*:*:*:*:*
Vendors & Products Snewscms
Snewscms snews
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-06T15:28:54.059Z

Reserved: 2026-04-04T13:33:00.414Z

Link: CVE-2016-20052

cve-icon Vulnrichment

Updated: 2026-04-06T15:25:27.510Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-04T14:16:17.520

Modified: 2026-04-14T19:05:45.853

Link: CVE-2016-20052

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T16:30:09Z

Weaknesses