Impact
LDAP Account Manager contains a local file inclusion flaw in its PDF export that allows authenticated users to load arbitrary local PHP files, leading to code execution. In combination with a related GHSA advisory, the flaw permits arbitrary code execution on the server. The vulnerability requires an authenticated LAM session and threatens the confidentiality, integrity, and availability of the hosting system.
Affected Systems
LDAPAccountManager’s LAM web frontend is affected. All releases prior to version 9.5 are vulnerable, and users running these older versions should upgrade. The product handles LDAP entries and DHCP settings via a web interface.
Risk and Exploitability
The CVSS score of 8.8 indicates high severity, while an EPSS score below 1% suggests low current exploitation probability; the vulnerability is not listed in CISA's KEV catalog. The flaw requires authentication, so the attack vector is local from an authenticated user through the PDF export feature, allowing remote code execution on the server.
OpenCVE Enrichment