Due to client-controlled permission check parameter, PAD CMS's upload photo functionality allows an unauthenticated remote attacker to upload files of any type and extension without restriction, which can then be executed leading to Remote Code Execution.This issue affects all 3 templates: www, bip and ww+bip.
This product is End-Of-Life and producent will not publish patches for this vulnerability.
This product is End-Of-Life and producent will not publish patches for this vulnerability.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://cert.pl/posts/2025/09/CVE-2025-7063 |
![]() ![]() |
History
Tue, 30 Sep 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Due to client-controlled permission check parameter, PAD CMS's upload photo functionality allows an unauthenticated remote attacker to upload files of any type and extension without restriction, which can then be executed leading to Remote Code Execution.This issue affects all 3 templates: www, bip and ww+bip. This product is End-Of-Life and producent will not publish patches for this vulnerability. | |
Title | Remote Code Execution via Unrestricted File Upload in PAD CMS | |
Weaknesses | CWE-434 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2025-09-30T19:15:27.470Z
Reserved: 2025-07-24T14:25:08.034Z
Link: CVE-2025-8120

No data.

Status : Received
Published: 2025-09-30T11:37:44.783
Modified: 2025-09-30T11:37:44.783
Link: CVE-2025-8120

No data.

No data.