An unrestricted file upload vulnerability exists in Simple E-Document versions 3.0 to 3.1 that allows an unauthenticated attacker to bypass authentication by sending a specific cookie header (access=3) with HTTP requests. The application’s upload mechanism fails to restrict file types and does not validate or sanitize user-supplied input, allowing attackers to upload malicious .php scripts. Authentication can be bypassed entirely by supplying a specially crafted cookie (access=3), granting access to the upload functionality without valid credentials. If file uploads are enabled on the server, the attacker can upload a web shell and gain remote code execution with the privileges of the web server user, potentially leading to full system compromise.
Metrics
Affected Vendors & Products
References
History
Thu, 31 Jul 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 31 Jul 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An unrestricted file upload vulnerability exists in Simple E-Document versions 3.0 to 3.1 that allows an unauthenticated attacker to bypass authentication by sending a specific cookie header (access=3) with HTTP requests. The application’s upload mechanism fails to restrict file types and does not validate or sanitize user-supplied input, allowing attackers to upload malicious .php scripts. Authentication can be bypassed entirely by supplying a specially crafted cookie (access=3), granting access to the upload functionality without valid credentials. If file uploads are enabled on the server, the attacker can upload a web shell and gain remote code execution with the privileges of the web server user, potentially leading to full system compromise. | |
Title | Simple E-Document Arbitrary File Upload RCE | |
Weaknesses | CWE-306 CWE-434 |
|
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-07-31T15:01:17.704Z
Updated: 2025-07-31T15:27:11.508Z
Reserved: 2025-07-30T15:47:44.009Z
Link: CVE-2014-125126

Updated: 2025-07-31T15:26:50.226Z

Status : Awaiting Analysis
Published: 2025-07-31T15:15:35.210
Modified: 2025-07-31T18:42:37.870
Link: CVE-2014-125126

No data.