Due to client-controlled permission check parameter, PAD CMS's file upload functionality allows an unauthenticated remote attacker to upload files of any type and extension without restriction, which can then be executed leading to Remote Code Execution. This issue affects all 3 templates: www, bip and ww+bip.

This product is End-Of-Life and producent will not publish patches for this vulnerability.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 30 Sep 2025 10:15:00 +0000

Type Values Removed Values Added
Description Due to client-controlled permission check parameter, PAD CMS's file upload functionality allows an unauthenticated remote attacker to upload files of any type and extension without restriction, which can then be executed leading to Remote Code Execution. This issue affects all 3 templates: www, bip and ww+bip. This product is End-Of-Life and producent will not publish patches for this vulnerability.
Title Remote Code Execution via Unrestricted File Upload in PAD CMS
Weaknesses CWE-434
References
Metrics cvssV4_0

{'score': 10, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-PL

Published:

Updated: 2025-09-30T10:03:59.027Z

Reserved: 2025-07-04T08:50:22.941Z

Link: CVE-2025-7063

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-09-30T11:37:43.360

Modified: 2025-09-30T11:37:43.360

Link: CVE-2025-7063

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.