Impact
The edit_adminlogo function in EyouCMS’s Index controller accepts a filename argument without validation, allowing an attacker to upload any file type to the server. This flaw can be exploited remotely and may lead to the execution of malicious code or disclosure of sensitive information if uploaded files are placed in writable directories.
Affected Systems
EyouCMS installations running version 1.7.1 or earlier are vulnerable. The issue is located in the file application/admin/controller/Index.php and affects the admin logo upload feature.
Risk and Exploitability
The CVSS score of 5.1 indicates moderate severity, and the EPSS score is not available, suggesting an unknown exploitation probability. The vulnerability is not listed in the CISA KEV catalog, but the public exploit is already available. An attacker can remotely submit a crafted request to the edit_adminlogo endpoint and upload arbitrary files.
OpenCVE Enrichment