Due to client-controlled permission check parameter, PAD CMS's photo upload functionality allows an unauthenticated remote attacker to upload files of any type and extension without restriction, which can then be executed leading to Remote Code Execution. This issue affects all 3 templates: www, bip and ww+bip.
This product is End-Of-Life and producent will not publish patches for this vulnerability.
This product is End-Of-Life and producent will not publish patches for this vulnerability.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://cert.pl/posts/2025/09/CVE-2025-7063 |
![]() ![]() |
History
Tue, 30 Sep 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Due to client-controlled permission check parameter, PAD CMS's photo upload functionality allows an unauthenticated remote attacker to upload files of any type and extension without restriction, which can then be executed leading to Remote Code Execution. This issue affects all 3 templates: www, bip and ww+bip. This product is End-Of-Life and producent will not publish patches for this vulnerability. | |
Title | Remote Code Execution via Unrestricted File Upload in PAD CMS | |
Weaknesses | CWE-434 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2025-09-30T10:04:07.400Z
Reserved: 2025-07-04T10:02:18.103Z
Link: CVE-2025-7065

No data.

Status : Received
Published: 2025-09-30T11:37:43.530
Modified: 2025-09-30T11:37:43.530
Link: CVE-2025-7065

No data.

No data.