| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-95cq-p4w2-32w5 | File Upload(RCE) Vulnerability in admidio |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 20 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Mar 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Admidio
Admidio admidio |
|
| Vendors & Products |
Admidio
Admidio admidio |
Thu, 19 Mar 2026 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Admidio is an open-source user management solution. Versions 5.0.6 and below contain a critical unrestricted file upload vulnerability in the Documents & Files module. Due to a design flaw in how CSRF token validation and file extension verification interact within UploadHandlerFile.php, an authenticated user with upload permissions can bypass file extension restrictions by intentionally submitting an invalid CSRF token. This allows the upload of arbitrary file types, including PHP scripts, which may lead to Remote Code Execution on the server, resulting in full server compromise, data exfiltration, and lateral movement. This issue has been fixed in version 5.0.7. | |
| Title | Admidio: Unrestricted File Upload via CSRF Token Validation Bypass in Documents & Files Module | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-20T17:07:02.484Z
Reserved: 2026-03-13T18:53:03.532Z
Link: CVE-2026-32756
Updated: 2026-03-20T17:06:49.772Z
Status : Awaiting Analysis
Published: 2026-03-20T00:16:16.763
Modified: 2026-03-20T13:37:50.737
Link: CVE-2026-32756
No data.
OpenCVE Enrichment
Updated: 2026-03-20T10:43:53Z
Github GHSA