Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. mahocommerce/maho
  4. ›
  5. CVE-2025-58449

CVE-2025-58449: Maho is Vulnerable to Authenticated Remote Code Execution via File Upload

September 9, 2025

In Maho 25.7.0, an authenticated staff user with access to the Dashboard and Catalog\Manage Products permissions can create a custom option on a listing with a file input field. By allowing file uploads with a .php extension, the user can use the filed to upload malicious PHP files, gaining remote code execution

References

  • github.com/MahoCommerce/maho
  • github.com/MahoCommerce/maho/commit/db54a1b44e9b3fd26b27ca4d5ece0af99c4dcb53
  • github.com/MahoCommerce/maho/security/advisories/GHSA-vgmm-27fc-vmgp
  • github.com/advisories/GHSA-vgmm-27fc-vmgp
  • nvd.nist.gov/vuln/detail/CVE-2025-58449

Code Behaviors & Features

Detect and mitigate CVE-2025-58449 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 25.9.0

Fixed versions

  • 25.9.0

Solution

Upgrade to version 25.9.0 or above.

Weakness

  • CWE-646: Reliance on File Name or Extension of Externally-Supplied File

Source file

packagist/mahocommerce/maho/CVE-2025-58449.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Thu, 25 Sep 2025 12:21:04 +0000.