CVE-2012-10044

CRITICAL

MobileCartly 1.0 - File Creation

Title source: llm

Description

MobileCartly version 1.0 contains an arbitrary file creation vulnerability in the savepage.php script. The application fails to perform authentication or authorization checks before invoking file_put_contents() on attacker-controlled input. An unauthenticated attacker can exploit this flaw by sending crafted HTTP GET requests to savepage.php, specifying both the filename and content. This allows arbitrary file creation within the pages/ directory or any writable path on the server, allowing remote code execution.

Exploits (3)

exploitdb WORKING POC VERIFIED
by Metasploit · rubywebappsphp
https://www.exploit-db.com/exploits/21079
exploitdb WORKING POC VERIFIED
by Yakir Wizman · textwebappsphp
https://www.exploit-db.com/exploits/20422
metasploit WORKING POC EXCELLENT
rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/mobilecartly_upload_exec.rb

Scores

CVSS v4 10.0
EPSS 0.6472
EPSS Percentile 98.5%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact total

Details

CWE
CWE-434
Status published
Products (1)
MobileCartly/MobileCartly 1.0
Published Aug 08, 2025
Tracked Since Feb 18, 2026