Glossword versions 1.8.8 through 1.8.12 contain an authenticated arbitrary file upload vulnerability. When deployed as a standalone application, the administrative interface (gw_admin.php) allows users with administrator privileges to upload files to the gw_temp/a/ directory. Due to insufficient validation of file type and path, attackers can upload and execute PHP payloads, resulting in remote code execution.
History

Thu, 07 Aug 2025 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Glossword
Glossword glossword
Vendors & Products Glossword
Glossword glossword

Wed, 06 Aug 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 05 Aug 2025 20:15:00 +0000

Type Values Removed Values Added
Description Glossword versions 1.8.8 through 1.8.12 contain an authenticated arbitrary file upload vulnerability. When deployed as a standalone application, the administrative interface (gw_admin.php) allows users with administrator privileges to upload files to the gw_temp/a/ directory. Due to insufficient validation of file type and path, attackers can upload and execute PHP payloads, resulting in remote code execution.
Title Glossword 1.8.8 - 1.8.12 Arbitrary File Upload RCE
Weaknesses CWE-434
References
Metrics cvssV4_0

{'score': 9.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-08-05T20:02:33.203Z

Updated: 2025-08-06T17:57:27.779Z

Reserved: 2025-08-05T14:30:38.272Z

Link: CVE-2013-10067

cve-icon Vulnrichment

Updated: 2025-08-06T17:57:24.139Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-05T20:15:35.387

Modified: 2025-08-06T18:15:28.427

Link: CVE-2013-10067

cve-icon Redhat

No data.