CVE-2025-32957 PUBLISHED

baserCMS: unsafe File Upload Leading to Remote Code Execution (RCE)

Assigner: GitHub_M
Reserved: 14.04.2025 Published: 31.03.2026 Updated: 31.03.2026

baserCMS is a website development framework. Prior to version 5.2.3, the application's restore function allows users to upload a .zip file, which is then automatically extracted. A PHP file inside the archive is included using require_once without validating or restricting the filename. An attacker can craft a malicious PHP file within the zip and achieve arbitrary code execution when it is included. This issue has been patched in version 5.2.3.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
CVSS Score: 8.7

Product Status

Vendor baserproject
Product basercms
Versions
  • Version < 5.2.3 is affected

References

Problem Types

  • CWE-434: Unrestricted Upload of File with Dangerous Type CWE