Due to client-controlled permission check parameter, PAD CMS's file upload functionality allows an unauthenticated remote attacker to upload files of any type and extension without restriction, which can then be executed leading to Remote Code Execution. This issue affects all 3 templates: www, bip and ww+bip.
This product is End-Of-Life and producent will not publish patches for this vulnerability.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://cert.pl/posts/2025/09/CVE-2025-7063 |
![]() ![]() |
History
Thu, 02 Oct 2025 09:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Pad
Pad pad Cms |
|
Vendors & Products |
Pad
Pad pad Cms |
Tue, 30 Sep 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 30 Sep 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Due to client-controlled permission check parameter, PAD CMS's file upload functionality allows an unauthenticated remote attacker to upload files of any type and extension without restriction, which can then be executed leading to Remote Code Execution. This issue affects all 3 templates: www, bip and ww+bip. This product is End-Of-Life and producent will not publish patches for this vulnerability. | |
Title | Remote Code Execution via Unrestricted File Upload in PAD CMS | |
Weaknesses | CWE-434 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: CERT-PL
Published: 2025-09-30T10:03:59.027Z
Updated: 2025-09-30T19:11:49.226Z
Reserved: 2025-07-04T08:50:22.941Z
Link: CVE-2025-7063

Updated: 2025-09-30T19:11:27.246Z

Status : Received
Published: 2025-09-30T11:37:43.360
Modified: 2025-09-30T11:37:43.360
Link: CVE-2025-7063

No data.