Due to client-controlled permission check parameter, PAD CMS's upload photo functionality allows an unauthenticated remote attacker to upload files of any type and extension without restriction, which can then be executed leading to Remote Code Execution.This issue affects all 3 templates: www, bip and ww+bip.
This product is End-Of-Life and producent will not publish patches for this vulnerability.
References
| Link | Resource |
|---|---|
| https://cert.pl/posts/2025/09/CVE-2025-7063 | Third Party Advisory |
Configurations
History
26 Nov 2025, 14:37
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Widzialni
Widzialni pad Cms |
|
| References | () https://cert.pl/posts/2025/09/CVE-2025-7063 - Third Party Advisory | |
| CPE | cpe:2.3:a:widzialni:pad_cms:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
30 Sep 2025, 11:37
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-30 11:37
Updated : 2025-11-26 14:37
NVD link : CVE-2025-8120
Mitre link : CVE-2025-8120
CVE.ORG link : CVE-2025-8120
JSON object : View
Products Affected
widzialni
- pad_cms
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
