Description
A security vulnerability has been detected in code-projects Content Management System 1.0. Impacted is an unknown function of the file /admin/edit_posts.php. The manipulation of the argument image leads to unrestricted upload. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used.
Published: 2026-01-02
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unrestricted File Upload
Action: Assess Impact
AI Analysis

Impact

A vulnerability exists in the /admin/edit_posts.php file of code‑projects Content Management System 1.0 that allows an attacker to manipulate the image parameter and upload files without restriction. This flaw permits any file type, including executable code, to be placed on the server. If the uploaded file is processed or executed, the attacker could gain remote code execution, compromise data integrity, or deface the site. The weakness is characterized by CWE‑284 (Improper Access Control) and CWE‑434 (Unrestricted Upload of File with Dangerous Type).

Affected Systems

The affected product is code‑projects Content Management System version 1.0. The vulnerability is identified in the admin edit_posts.php component and is present in the base release referenced by the CPE cpe:2.3:a:code-projects:content_management_system:1.0.*.

Risk and Exploitability

The CVSS base score of 5.1 indicates moderate severity. The EPSS score is less than 1%, showing a low probability of exploitation, and the issue is not listed in the CISA KEV catalog. Because the flaw allows unrestricted file uploads, an attacker can perform the attack remotely without authentication. If the server parses or executes the uploaded content, the attacker can execute arbitrary code or modify site data. While no active exploit is currently known in the wild, the capabilities remain, so monitoring and mitigation are recommended.

Generated by OpenCVE AI on April 18, 2026 at 08:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for an official patch or newer release from the vendor and install it immediately.
  • Validate uploaded files on the server side, restricting to allowed image MIME types and file extensions and rejecting all others.
  • Configure the upload directory to be non‑executable and set strict file permissions so that uploaded files cannot be run by the web server.
  • If no patch is available, consider disabling the upload feature or blocking direct access to /admin/edit_posts.php.

Generated by OpenCVE AI on April 18, 2026 at 08:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 08:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:code-projects:content_management_system:*:*:*:*:*:*:*:*

Tue, 20 Jan 2026 20:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:code-projects:content_management_system:1.0:*:*:*:*:*:*:*

Mon, 05 Jan 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects content Management System
Vendors & Products Code-projects
Code-projects content Management System

Fri, 02 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 02 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in code-projects Content Management System 1.0. Impacted is an unknown function of the file /admin/edit_posts.php. The manipulation of the argument image leads to unrestricted upload. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used.
Title code-projects Content Management System edit_posts.php unrestricted upload
Weaknesses CWE-284
CWE-434
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Content Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:09:41.626Z

Reserved: 2026-01-02T07:52:05.446Z

Link: CVE-2026-0566

cve-icon Vulnrichment

Updated: 2026-01-02T21:00:51.675Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-02T17:16:25.263

Modified: 2026-01-20T20:48:01.080

Link: CVE-2026-0566

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T08:45:41Z

Weaknesses