CVE-2012-10056

HIGH

PHP Volunteer Management System v1.0.2 - Code Injection

Title source: llm

Description

PHP Volunteer Management System v1.0.2 contains an arbitrary file upload vulnerability in its document upload functionality. Authenticated users can upload files to the mods/documents/uploads/ directory without any restriction on file type or extension. Because this directory is publicly accessible and lacks execution controls, attackers can upload a malicious PHP payload and execute it remotely. The application ships with default credentials, making exploitation trivial. Once authenticated, the attacker can upload a PHP shell and trigger it via a direct GET request.

Exploits (3)

exploitdb WORKING POC VERIFIED
by Metasploit · rubywebappsphp
https://www.exploit-db.com/exploits/18957
exploitdb WRITEUP VERIFIED
by Ashoo · textwebappsphp
https://www.exploit-db.com/exploits/18941
metasploit WORKING POC EXCELLENT
rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/php_volunteer_upload_exec.rb

Scores

CVSS v4 8.7
EPSS 0.3275
EPSS Percentile 96.9%
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Details

CWE
CWE-434
Status published
Products (1)
PHP Volunteer Management/PHP Volunteer Management 1.0.2
Published Aug 13, 2025
Tracked Since Feb 18, 2026