An arbitrary code execution vulnerability in Badaso CMS 2.9.11. The Media Manager allows authenticated users to upload files containing embedded PHP code via the file-upload endpoint, bypassing content-type validation. When such a file is accessed via its URL, the server executes the PHP payload, enabling an attacker to run arbitrary system commands and achieve full compromise of the underlying host. This has been demonstrated by embedding a backdoor within a PDF and renaming it with a .php extension.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/uasoft-indonesia/badaso | Product | 
| https://medium.com/@pat.sanitjairak/remote-code-execution-in-a-plain-view-0f86f183543d | Exploit Third Party Advisory | 
Configurations
                    History
                    09 Sep 2025, 18:55
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | Uatech Uatech badaso | |
| CPE | cpe:2.3:a:uatech:badaso:2.9.11:*:*:*:*:*:*:* | |
| References | () https://github.com/uasoft-indonesia/badaso - Product | |
| References | () https://medium.com/@pat.sanitjairak/remote-code-execution-in-a-plain-view-0f86f183543d - Exploit, Third Party Advisory | 
28 Aug 2025, 17:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-434 | 
27 Aug 2025, 14:15
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | |
| CWE | CWE-94 | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 9.8 | 
26 Aug 2025, 20:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-08-26 20:15
Updated : 2025-09-09 18:55
NVD link : CVE-2025-52353
Mitre link : CVE-2025-52353
CVE.ORG link : CVE-2025-52353
JSON object : View
Products Affected
                uatech
- badaso
CWE
                
                    
                        
                        CWE-434
                        
            Unrestricted Upload of File with Dangerous Type
