CVE-2020-36973

MEDIUM

PDW File Browser 1.3 - RCE

Title source: llm
STIX 2.1

Description

PDW File Browser 1.3 contains a remote code execution vulnerability that allows authenticated users to upload and rename webshell files to arbitrary web server locations. Attackers can upload a .txt webshell, rename it to .php, and move it to accessible directories using double-encoded path traversal techniques.

Exploits (1)

exploitdb WORKING POC
by David Bimmel · textwebappsphp
https://www.exploit-db.com/exploits/48987

Scores

CVSS v3 6.5
EPSS 0.0010
EPSS Percentile 27.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-434
Status published
Products (1)
michalc/PDW File Browser <=1.3
Published Jan 28, 2026
Tracked Since Feb 18, 2026