EGallery version 1.2 contains an unauthenticated arbitrary file upload vulnerability in the uploadify.php script. The application fails to validate file types or enforce authentication, allowing remote attackers to upload malicious PHP files directly into the web-accessible egallery/ directory. This results in full remote code execution under the web server context.
Metrics
Affected Vendors & Products
References
History
Tue, 12 Aug 2025 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Egallery
Egallery egallery |
|
Vendors & Products |
Egallery
Egallery egallery |
Fri, 08 Aug 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 08 Aug 2025 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | EGallery version 1.2 contains an unauthenticated arbitrary file upload vulnerability in the uploadify.php script. The application fails to validate file types or enforce authentication, allowing remote attackers to upload malicious PHP files directly into the web-accessible egallery/ directory. This results in full remote code execution under the web server context. | |
Title | EGallery 1.2 Arbitrary PHP File Upload | |
Weaknesses | CWE-434 | |
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-08-08T18:10:46.550Z
Updated: 2025-08-08T18:55:06.700Z
Reserved: 2025-08-08T16:21:16.764Z
Link: CVE-2012-10052

Updated: 2025-08-08T18:54:55.231Z

Status : Awaiting Analysis
Published: 2025-08-08T19:15:35.487
Modified: 2025-08-08T20:30:18.180
Link: CVE-2012-10052

No data.