LeptonCMS version 7.3.0 contains an arbitrary file upload vulnerability, which is caused by the lack of proper validation for uploaded files. An authenticated attacker can exploit this vulnerability by uploading a specially crafted ZIP/PHP file to execute arbitrary code.
References
| Link | Resource |
|---|---|
| http://lepton.com | Not Applicable |
| https://github.com/Kayi626/Vulns/blob/UserAccount/LEPTON_CMS_7.3.0_File_Upload_A.pdf | Exploit Third Party Advisory |
| https://github.com/Kayi626/Vulns/blob/UserAccount/LEPTON_CMS_7.3.0_File_Upload_B.pdf | Exploit Third Party Advisory |
| https://github.com/Kayi626/Vulns/blob/UserAccount/LEPTON_CMS_7.3.0_File_Upload_C.pdf | Exploit Third Party Advisory |
Configurations
History
10 Dec 2025, 20:34
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:lepton-cms:leptoncms:7.3.0:*:*:*:*:*:*:* | |
| References | () http://lepton.com - Not Applicable | |
| References | () https://github.com/Kayi626/Vulns/blob/UserAccount/LEPTON_CMS_7.3.0_File_Upload_A.pdf - Exploit, Third Party Advisory | |
| References | () https://github.com/Kayi626/Vulns/blob/UserAccount/LEPTON_CMS_7.3.0_File_Upload_B.pdf - Exploit, Third Party Advisory | |
| References | () https://github.com/Kayi626/Vulns/blob/UserAccount/LEPTON_CMS_7.3.0_File_Upload_C.pdf - Exploit, Third Party Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
| First Time |
Lepton-cms leptoncms
Lepton-cms |
|
| CWE | CWE-434 |
09 Dec 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-09 17:15
Updated : 2025-12-11 20:16
NVD link : CVE-2025-56704
Mitre link : CVE-2025-56704
CVE.ORG link : CVE-2025-56704
JSON object : View
Products Affected
lepton-cms
- leptoncms
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
