Description
baserCMS is a website development framework. Prior to version 5.2.3, the application's restore function allows users to upload a .zip file, which is then automatically extracted. A PHP file inside the archive is included using require_once without validating or restricting the filename. An attacker can craft a malicious PHP file within the zip and achieve arbitrary code execution when it is included. This issue has been patched in version 5.2.3.
Published: 2026-03-31
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

baserCMS a PHP‑based website framework that includes a restore feature allowing users to upload ZIP archives. Prior to version 5.2.3, the restore process automatically extracts the archive and then inclusively requires any PHP file found inside. An attacker can embed a malicious PHP script within a crafted ZIP package so that it is executed when the archive is restored, resulting in arbitrary code execution on the web server. This vulnerability is categorized as a file‑upload flaw (CWE‑434).

Affected Systems

The affected product is baserCMS from baserproject. Any installation running a version before 5.2.3 is vulnerable. The flaw was addressed in the 5.2.3 release and later versions are considered safe.

Risk and Exploitability

The score of 8.7 under CVSS denotes high severity, while the EPSS value of less than 1 % suggests that exploitation is currently unlikely, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that an attacker can trigger the flaw by uploading a crafted ZIP file through the web interface's restore function. If the vulnerability is exploited, the attacker could gain full control over the application server, compromising confidentiality, integrity, and availability of the hosted services.

Generated by OpenCVE AI on April 2, 2026 at 04:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply baserCMS update to version 5.2.3 or newer, as released by baserproject.

Generated by OpenCVE AI on April 2, 2026 at 04:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-hv78-cwp4-8r7r baserCMS has Unsafe File Upload Leading to Remote Code Execution (RCE)
History

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Baserproject
Baserproject basercms
Vendors & Products Baserproject
Baserproject basercms

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
First Time appeared Basercms
Basercms basercms
CPEs cpe:2.3:a:basercms:basercms:*:*:*:*:*:*:*:*
Vendors & Products Basercms
Basercms basercms

Tue, 31 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 31 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
Description baserCMS is a website development framework. Prior to version 5.2.3, the application's restore function allows users to upload a .zip file, which is then automatically extracted. A PHP file inside the archive is included using require_once without validating or restricting the filename. An attacker can craft a malicious PHP file within the zip and achieve arbitrary code execution when it is included. This issue has been patched in version 5.2.3.
Title baserCMS: unsafe File Upload Leading to Remote Code Execution (RCE)
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 8.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N'}


Subscriptions

Basercms Basercms
Baserproject Basercms
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-31T19:09:23.581Z

Reserved: 2025-04-14T21:47:11.452Z

Link: CVE-2025-32957

cve-icon Vulnrichment

Updated: 2026-03-31T19:05:50.145Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-31T01:16:34.530

Modified: 2026-04-01T20:31:57.590

Link: CVE-2025-32957

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:10:48Z

Weaknesses