This product is End-Of-Life and producent will not publish patches for this vulnerability.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-31716 | Due to client-controlled permission check parameter, PAD CMS's file upload functionality allows an unauthenticated remote attacker to upload files of any type and extension without restriction, which can then be executed leading to Remote Code Execution. This issue affects all 3 templates: www, bip and ww+bip. This product is End-Of-Life and producent will not publish patches for this vulnerability. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://cert.pl/posts/2025/09/CVE-2025-7063 |
|
Thu, 02 Oct 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pad
Pad pad Cms |
|
| Vendors & Products |
Pad
Pad pad Cms |
Tue, 30 Sep 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 30 Sep 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Due to client-controlled permission check parameter, PAD CMS's file upload functionality allows an unauthenticated remote attacker to upload files of any type and extension without restriction, which can then be executed leading to Remote Code Execution. This issue affects all 3 templates: www, bip and ww+bip. This product is End-Of-Life and producent will not publish patches for this vulnerability. | |
| Title | Remote Code Execution via Unrestricted File Upload in PAD CMS | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2025-09-30T19:11:49.226Z
Reserved: 2025-07-04T08:50:22.941Z
Link: CVE-2025-7063
Updated: 2025-09-30T19:11:27.246Z
Status : Awaiting Analysis
Published: 2025-09-30T11:37:43.360
Modified: 2025-10-02T19:12:42.843
Link: CVE-2025-7063
No data.
OpenCVE Enrichment
Updated: 2025-10-02T08:46:28Z
EUVD