Description
A weakness has been identified in MacCMS Pro up to 2022.1.3. This vulnerability affects the function install of the file /admi.php/admin/addon/add.html of the component Plugin Installation Handler. Executing a manipulation can lead to unrestricted upload. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-05-01
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A weakness in MacCMS Pro up to version 2022.1.3 allows an attacker to upload arbitrary files through the Plugin Installation Handler’s add.html interface. The vulnerability qualifies as Unrestricted Upload of File with Dangerous Type (CWE-434) and Improper Access Control (CWE-284), giving the attacker the ability to place malicious payloads on the server. If a script or web-shell is uploaded, remote code execution or file inclusion attacks may follow, violating confidentiality, integrity, and availability of the impacted application.

Affected Systems

The affected system is MacCMS Pro, a content management platform. The flaw exists in the Plugin Installation Handler component, specifically the /admi.php/admin/addon/add.html endpoint, and it affects all releases up to and including 2022.1.3. No later versions were identified in the provided data.

Risk and Exploitability

The CVSS base score of 5.1 indicates a medium severity risk, but the public availability of an exploit and the ability to perform the attack from a remote location raise concerns. EPSS is not available, and the vulnerability is not listed in CISA’s KEV catalog. The likely attack vector is a remotely executed web request to the vulnerable endpoint, where an authenticated or unauthenticated attacker can upload files without restriction. An attacker can then execute or access the uploaded content, potentially leading to further compromise. The vendor’s lack of response creates a heightened risk that the flaw remains unpatched in production environments.

Generated by OpenCVE AI on May 1, 2026 at 23:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify whether a patch or newer release of MacCMS Pro that addresses the upload vulnerability is available and apply it immediately.
  • If no patch is available, disable or restrict access to the /admi.php/admin/addon/add.html endpoint or the plugin installation feature entirely to prevent uploads.
  • Implement strict file upload validation on the endpoint, allowing only trusted file types and enforcing size limits, and enforce proper authentication and authorization checks for access to this administrative functionality.

Generated by OpenCVE AI on May 1, 2026 at 23:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 01 May 2026 14:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 01 May 2026 11:00:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in MacCMS Pro up to 2022.1.3. This vulnerability affects the function install of the file /admi.php/admin/addon/add.html of the component Plugin Installation Handler. Executing a manipulation can lead to unrestricted upload. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title MacCMS Pro Plugin Installation add.html install unrestricted upload
Weaknesses CWE-284
CWE-434
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-01T14:03:55.821Z

Reserved: 2026-05-01T06:04:34.942Z

Link: CVE-2026-7578

cve-icon Vulnrichment

Updated: 2026-05-01T14:02:49.881Z

cve-icon NVD

Status : Deferred

Published: 2026-05-01T11:16:19.680

Modified: 2026-05-01T15:26:24.553

Link: CVE-2026-7578

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T00:00:14Z

Weaknesses