Description
A vulnerability was found in GreenCMS up to 2.3. Affected is the function themeadd of the file /index.php?m=admin&c=custom&a=themeadd. The manipulation results in unrestricted upload. The attack can be launched remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
Published: 2026-04-26
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote File Upload
Action: Apply Patch
AI Analysis

Impact

The vulnerability resides in GreenCMS’s themeadd function located at /index.php?m=admin&c=custom&a=themeadd and allows an attacker to upload any file type without restriction, potentially facilitating the placement of malicious code on the server. The flaw is identified with CWE-284 (Improper Access Control) and CWE-434 (Unrestricted Upload of File with Dangerous Type). The CVSS score of 5.3 reflects a moderate severity, primarily due to the remote file upload capability and the fact that the exploit is publicly available, though the description does not explicitly state that code execution is guaranteed. The impact is that an attacker could place executable files or web shells in the upload directory, thereby gaining further foothold if the server is improperly configured to execute uploaded content.

Affected Systems

GreenCMS versions up to 2.3 are affected. The vulnerability appears in the admin theme addition interface and is only present in releases that are no longer supported by the maintainer. No specific sub‑versions are listed beyond the general "up to 2.3" range.

Risk and Exploitability

The EPSS score is listed as less than 1 %, indicating that the probability of exploitation is low at present. The vulnerability is not included in the CISA KEV catalog, which suggests that active, widespread exploitation has not been reported. Nonetheless, because the attack can be launched remotely and the exploit has been made public, the risk remains for unpatched systems. Attackers would need to craft a request to the themeadd endpoint and supply a file of their choosing; if the server allows the file to be executed, further compromise could occur. The overall risk is moderate due to the lower probability of exploitation, but it warrants timely remediation to prevent a potential escalation.

Generated by OpenCVE AI on April 28, 2026 at 05:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade or patch GreenCMS to a version that fixes the themeadd file‑upload issue.
  • If a patch is not immediately available, disable the themeadd functionality or restrict the upload endpoint to accept only whitelisted image extensions and enforce strict server‑side validation.
  • Reconfigure the web server to serve uploaded files from a directory with execute permissions disabled, ensuring that any user‑supplied file cannot be run as code.

Generated by OpenCVE AI on April 28, 2026 at 05:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 26 Apr 2026 14:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in GreenCMS up to 2.3. Affected is the function themeadd of the file /index.php?m=admin&c=custom&a=themeadd. The manipulation results in unrestricted upload. The attack can be launched remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
Title GreenCMS index.php themeadd unrestricted upload
First Time appeared Greencms
Greencms greencms
Weaknesses CWE-284
CWE-434
CPEs cpe:2.3:a:greencms:greencms:*:*:*:*:*:*:*:*
Vendors & Products Greencms
Greencms greencms
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Greencms Greencms
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-27T16:41:31.003Z

Reserved: 2026-04-25T16:01:42.025Z

Link: CVE-2026-7044

cve-icon Vulnrichment

Updated: 2026-04-27T16:41:26.651Z

cve-icon NVD

Status : Deferred

Published: 2026-04-26T22:17:32.057

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-7044

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T05:15:22Z

Weaknesses