Due to client-controlled permission check parameter, PAD...
Critical severity
Unreviewed
Published
Sep 30, 2025
to the GitHub Advisory Database
•
Updated Nov 26, 2025
Description
Published by the National Vulnerability Database
Sep 30, 2025
Published to the GitHub Advisory Database
Sep 30, 2025
Last updated
Nov 26, 2025
Due to client-controlled permission check parameter, PAD CMS's file upload functionality allows an unauthenticated remote attacker to upload files of any type and extension without restriction, which can then be executed leading to Remote Code Execution. This issue affects all 3 templates: www, bip and ww+bip.
This product is End-Of-Life and producent will not publish patches for this vulnerability.
References