← Retour aux CVEs
CVE-2020-37023
HIGH8.8
Description
Koken CMS 0.22.24 contains a file upload vulnerability that allows authenticated attackers to bypass file extension restrictions by renaming malicious PHP files. Attackers can upload PHP files with system command execution capabilities by manipulating the file upload request through a web proxy and changing the file extension.
Details CVE
Score CVSS v3.18.8
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisLOW
Interaction utilisateurNONE
Publie1/30/2026
Derniere modification2/4/2026
Sourcenvd
Observations honeypot0
Faiblesses (CWE)
CWE-434
References
http://koken.me/(disclosure@vulncheck.com)
https://github.com/V1n1v131r4/Bypass-File-Upload-on-Koken-CMS/blob/master/README.md(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/48706(disclosure@vulncheck.com)
https://www.softaculous.com/apps/cms/Koken(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/koken-cms-arbitrary-file-upload(disclosure@vulncheck.com)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.