Description
Admidio is an open-source user management solution. Versions 5.0.6 and below contain a critical unrestricted file upload vulnerability in the Documents & Files module. Due to a design flaw in how CSRF token validation and file extension verification interact within UploadHandlerFile.php, an authenticated user with upload permissions can bypass file extension restrictions by intentionally submitting an invalid CSRF token. This allows the upload of arbitrary file types, including PHP scripts, which may lead to Remote Code Execution on the server, resulting in full server compromise, data exfiltration, and lateral movement. This issue has been fixed in version 5.0.7.
Published: 2026-03-19
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

Admidio versions 5.0.6 and earlier contain an unrestricted file upload flaw in the Documents & Files module. A design mistake in CSRF token validation and file extension checking allows an authenticated user with upload permissions to bypass the restriction by submitting an invalid token. The attacker can upload arbitrary files, including PHP scripts, which, if executed, can lead to remote code execution, full server compromise, data exfiltration, and lateral movement.

Affected Systems

This vulnerability affects the Admidio open‑source user management solution, specifically the Documents & Files module. Any installation running version 5.0.6 or earlier is susceptible. The product is identified as Admidio:admidio in the Common Platform Enumeration.

Risk and Exploitability

With a CVSS score of 8.8, the flaw is considered high severity. The EPSS score is below 1 %, suggesting a low current probability of exploitation, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Nonetheless, the flaw requires only an authenticated user with upload rights and a deliberate CSRF token trick to be exploited, which could result in arbitrary code execution on the host.

Generated by OpenCVE AI on March 23, 2026 at 18:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Admidio to version 5.0.7 or later, which fixes the CSRF token bypass and restores proper file type validation.

Generated by OpenCVE AI on March 23, 2026 at 18:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-95cq-p4w2-32w5 File Upload(RCE) Vulnerability in admidio
History

Mon, 23 Mar 2026 17:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:admidio:admidio:*:*:*:*:*:*:*:*

Fri, 20 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Admidio
Admidio admidio
Vendors & Products Admidio
Admidio admidio

Thu, 19 Mar 2026 23:30:00 +0000

Type Values Removed Values Added
Description Admidio is an open-source user management solution. Versions 5.0.6 and below contain a critical unrestricted file upload vulnerability in the Documents & Files module. Due to a design flaw in how CSRF token validation and file extension verification interact within UploadHandlerFile.php, an authenticated user with upload permissions can bypass file extension restrictions by intentionally submitting an invalid CSRF token. This allows the upload of arbitrary file types, including PHP scripts, which may lead to Remote Code Execution on the server, resulting in full server compromise, data exfiltration, and lateral movement. This issue has been fixed in version 5.0.7.
Title Admidio: Unrestricted File Upload via CSRF Token Validation Bypass in Documents & Files Module
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-20T17:07:02.484Z

Reserved: 2026-03-13T18:53:03.532Z

Link: CVE-2026-32756

cve-icon Vulnrichment

Updated: 2026-03-20T17:06:49.772Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-20T00:16:16.763

Modified: 2026-03-23T16:51:44.110

Link: CVE-2026-32756

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T11:54:04Z

Weaknesses