Description
Multiple PHP remote file inclusion vulnerabilities in Advanced Comment System 1.0 allow remote attackers to execute arbitrary PHP code via a URL in the ACS_path parameter to (1) index.php and (2) admin.php in advanced_comment_system/. NOTE: this might only be a vulnerability when the administrator has not followed installation instructions in install.php. NOTE: this might be the same as CVE-2020-35598.
Exploits (4)
References (2)
Core 2
Core References
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/36643
Exploit, Third Party Advisory, VDB Entry exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/9623
Scores
EPSS
0.0313
EPSS Percentile
86.9%
Details
CWE
CWE-94
Status
published
Products (1)
plohni/advanced_comment_system
1.0
Published
Jan 18, 2010
Tracked Since
Feb 18, 2026