EGallery version 1.2 contains an unauthenticated arbitrary file upload vulnerability in the uploadify.php script. The application fails to validate file types or enforce authentication, allowing remote attackers to upload malicious PHP files directly into the web-accessible egallery/ directory. This results in full remote code execution under the web server context.
History

Tue, 12 Aug 2025 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Egallery
Egallery egallery
Vendors & Products Egallery
Egallery egallery

Fri, 08 Aug 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 08 Aug 2025 18:30:00 +0000

Type Values Removed Values Added
Description EGallery version 1.2 contains an unauthenticated arbitrary file upload vulnerability in the uploadify.php script. The application fails to validate file types or enforce authentication, allowing remote attackers to upload malicious PHP files directly into the web-accessible egallery/ directory. This results in full remote code execution under the web server context.
Title EGallery 1.2 Arbitrary PHP File Upload
Weaknesses CWE-434
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-08-08T18:10:46.550Z

Updated: 2025-08-08T18:55:06.700Z

Reserved: 2025-08-08T16:21:16.764Z

Link: CVE-2012-10052

cve-icon Vulnrichment

Updated: 2025-08-08T18:54:55.231Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-08T19:15:35.487

Modified: 2025-08-08T20:30:18.180

Link: CVE-2012-10052

cve-icon Redhat

No data.