Impact
e107 CMS 2.3.0 contains a flaw that allows authenticated users with theme installation rights to upload a crafted theme package via the theme.php endpoint, which deploys a web shell and lets attackers execute arbitrary system commands through payload.php. This vulnerability enables remote code execution and poses a high risk of full system compromise, classified as CWE‑434 due to an unrestricted upload of potentially dangerous files.
Affected Systems
Affected product is E107 CMS 2.3.0. Only this specific version is known to contain the flaw; earlier versions are not impacted as per the available data.
Risk and Exploitability
The CVSS score of 8.7 classifies the issue as high severity, providing attackers the ability to run commands on the host if they possess theme upload privileges. The EPSS score is not available, so the current exploitation probability is unclear, but the vulnerability is not listed in the CISA KEV catalog. Attackers must first authenticate to the CMS and have permission to upload themes, after which the malicious upload directly exposes the server to remote code execution.
OpenCVE Enrichment