Description
An arbitrary file upload vulnerability in MK-Auth 23.01K4.9 allows attackers to execute arbitrary code via uploading a crafted PHP file.
Published: 2026-05-12
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

MK-Auth version 23.01K4.9 contains an arbitrary file upload flaw that lets an attacker place a PHP file on the server and have it executed. The vulnerability arises because uploaded files are stored without type validation or execution restrictions, enabling the attacker to run arbitrary code on the host. Such code execution could compromise system confidentiality, integrity, and availability for any user who can access the upload functionality.

Affected Systems

The flaw affects the MK-Auth application, specifically the 23.01K4.9 release. No additional versions or vendors are listed in the CVE record. Administrators of systems running this release should verify the exact deployment and identify any active upload endpoints.

Risk and Exploitability

The vulnerability is highly exploitable for an attacker with network access to the MK-Auth instance. Because the upload interface is likely exposed over HTTP, the attack vector is remote. The CVSS score is not provided, but the presence of RCE and lack of mitigation imply a severe risk. No EPSS score is available, and the issue is not listed in CISA’s KEV catalog at this time. If the upload directory is reachable, an attacker can proceed without authentication or with minimal credentials, making exploitation straightforward.

Generated by OpenCVE AI on May 12, 2026 at 17:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a patch or upgrade to a version of MK-Auth that includes proper file type validation and prohibits execution of uploaded PHP files
  • Move the upload directory outside the web root or disable script execution in that directory via web‑server configuration
  • Restrict allowed file types to non-executable formats (e.g., images, documents) and enforce MIME‑type checks before storage
  • If an upgrade is not possible, treat the upload function as a potential command‑injection point and block access until mitigated

Generated by OpenCVE AI on May 12, 2026 at 17:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 18:15:00 +0000

Type Values Removed Values Added
Title Arbitrary File Upload in MK‑Auth Allowing Remote Code Execution
Weaknesses CWE-20
CWE-434

Tue, 12 May 2026 16:00:00 +0000

Type Values Removed Values Added
Description An arbitrary file upload vulnerability in MK-Auth 23.01K4.9 allows attackers to execute arbitrary code via uploading a crafted PHP file.
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-12T15:33:33.545Z

Reserved: 2023-03-05T00:00:00.000Z

Link: CVE-2023-27753

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-12T16:16:11.200

Modified: 2026-05-12T16:16:11.200

Link: CVE-2023-27753

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T18:00:12Z

Weaknesses