CVE-2012-10056
HIGHPHP Volunteer Management System v1.0.2 - Code Injection
Title source: llmDescription
PHP Volunteer Management System v1.0.2 contains an arbitrary file upload vulnerability in its document upload functionality. Authenticated users can upload files to the mods/documents/uploads/ directory without any restriction on file type or extension. Because this directory is publicly accessible and lacks execution controls, attackers can upload a malicious PHP payload and execute it remotely. The application ships with default credentials, making exploitation trivial. Once authenticated, the attacker can upload a PHP shell and trigger it via a direct GET request.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubywebappsphp
https://www.exploit-db.com/exploits/18957
metasploit
WORKING POC
EXCELLENT
rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/php_volunteer_upload_exec.rb
References (5)
Scores
CVSS v4
8.7
EPSS
0.3275
EPSS Percentile
96.9%
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Details
CWE
CWE-434
Status
published
Products (1)
PHP Volunteer Management/PHP Volunteer Management
1.0.2
Published
Aug 13, 2025
Tracked Since
Feb 18, 2026