Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. badaso/core
  4. ›
  5. CVE-2025-52353

CVE-2025-52353: Badaso CMS file upload vulnerability

August 26, 2025

An arbitrary code execution vulnerability in Badaso CMS 2.9.11. The Media Manager allows authenticated users to upload files containing embedded PHP code via the file-upload endpoint, bypassing content-type validation. When such a file is accessed via its URL, the server executes the PHP payload, enabling an attacker to run arbitrary system commands and achieve full compromise of the underlying host. This has been demonstrated by embedding a backdoor within a PDF and renaming it with a .php extension.

References

  • github.com/advisories/GHSA-gqp9-jh35-439m
  • github.com/uasoft-indonesia/badaso
  • medium.com/@pat.sanitjairak/remote-code-execution-in-a-plain-view-0f86f183543d
  • nvd.nist.gov/vuln/detail/CVE-2025-52353

Code Behaviors & Features

Detect and mitigate CVE-2025-52353 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 2.9.11

Solution

Unfortunately, there is no solution available yet.

Weakness

  • CWE-434: Unrestricted Upload of File with Dangerous Type

Source file

packagist/badaso/core/CVE-2025-52353.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 27 Aug 2025 00:18:59 +0000.