Victor CMS 1.0 contains a file upload vulnerability that allows authenticated users to upload malicious PHP files through the profile image upload feature. Attackers can upload a PHP shell to the /img directory and execute system commands by accessing the uploaded file via web browser.
References
| Link | Resource |
|---|---|
| https://github.com/VictorAlagwu/CMSsite | Product |
| https://www.exploit-db.com/exploits/49310 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/victor-cms-file-upload-to-rce | Third Party Advisory |
Configurations
History
10 Feb 2026, 14:53
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/VictorAlagwu/CMSsite - Product | |
| References | () https://www.exploit-db.com/exploits/49310 - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://www.vulncheck.com/advisories/victor-cms-file-upload-to-rce - Third Party Advisory | |
| CPE | cpe:2.3:a:victor_cms_project:victor_cms:1.0:*:*:*:*:*:*:* | |
| First Time |
Victor Cms Project
Victor Cms Project victor Cms |
27 Jan 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-27 16:16
Updated : 2026-02-10 14:53
NVD link : CVE-2020-36942
Mitre link : CVE-2020-36942
CVE.ORG link : CVE-2020-36942
JSON object : View
Products Affected
victor_cms_project
- victor_cms
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
