CVE-2012-10044
CRITICALMobileCartly 1.0 - File Creation
Title source: llmDescription
MobileCartly version 1.0 contains an arbitrary file creation vulnerability in the savepage.php script. The application fails to perform authentication or authorization checks before invoking file_put_contents() on attacker-controlled input. An unauthenticated attacker can exploit this flaw by sending crafted HTTP GET requests to savepage.php, specifying both the filename and content. This allows arbitrary file creation within the pages/ directory or any writable path on the server, allowing remote code execution.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubywebappsphp
https://www.exploit-db.com/exploits/21079
exploitdb
WORKING POC
VERIFIED
by Yakir Wizman · textwebappsphp
https://www.exploit-db.com/exploits/20422
metasploit
WORKING POC
EXCELLENT
rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/mobilecartly_upload_exec.rb
References (5)
Scores
CVSS v4
10.0
EPSS
0.6472
EPSS Percentile
98.5%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-434
Status
published
Products (1)
MobileCartly/MobileCartly
1.0
Published
Aug 08, 2025
Tracked Since
Feb 18, 2026