This exploit demonstrates an arbitrary file upload vulnerability in softxmlcms, allowing attackers to upload malicious PHP or ASP files via the XMLEditor2.0/uploadfile1.asp endpoint. The uploaded file is accessible under the /images/ directory, leading to remote code execution.
Classification
Working Poc 90%
Target:
softxmlcms (version unspecified)
No auth needed
Prerequisites:
Access to the upload endpoint · Ability to send HTTP requests to the target server