CVE-2012-10052
CRITICALEGallery 1.2 - RCE
Title source: llmDescription
EGallery version 1.2 contains an unauthenticated arbitrary file upload vulnerability in the uploadify.php script. The application fails to validate file types or enforce authentication, allowing remote attackers to upload malicious PHP files directly into the web-accessible egallery/ directory. This results in full remote code execution under the web server context.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubywebappsphp
https://www.exploit-db.com/exploits/20029
metasploit
WORKING POC
EXCELLENT
by Sammy FORGIT, juan vazquez · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/egallery_upload_exec.rb
References (5)
Scores
CVSS v4
9.3
EPSS
0.7245
EPSS Percentile
98.8%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Details
CWE
CWE-434
Status
published
Products (1)
EGallery/EGallery
1.2
Published
Aug 08, 2025
Tracked Since
Feb 18, 2026