{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T14:38:53.195","vulnerabilities":[{"cve":{"id":"CVE-2025-52353","sourceIdentifier":"cve@mitre.org","published":"2025-08-26T20:15:40.460","lastModified":"2025-09-09T18:55:07.583","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"An arbitrary code execution vulnerability in Badaso CMS 2.9.11. The Media Manager allows authenticated users to upload files containing embedded PHP code via the file-upload endpoint, bypassing content-type validation. When such a file is accessed via its URL, the server executes the PHP payload, enabling an attacker to run arbitrary system commands and achieve full compromise of the underlying host. This has been demonstrated by embedding a backdoor within a PDF and renaming it with a .php extension."},{"lang":"es","value":"Una vulnerabilidad de ejecución de código arbitrario en Badaso CMS 2.9.11. El Media Manager permite a los usuarios autenticados subir archivos con código PHP incrustado a través del endpoint de carga de archivos, omitiendo la validación del tipo de contenido. Al acceder a dicho archivo a través de su URL, el servidor ejecuta la carga útil PHP, lo que permite a un atacante ejecutar comandos arbitrarios del sistema y comprometer completamente el host subyacente. Esto se ha demostrado incrustando una puerta trasera en un PDF y renombrándolo con la extensión .php."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-434"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:uatech:badaso:2.9.11:*:*:*:*:*:*:*","matchCriteriaId":"5B8BE717-1F7D-489F-BBC6-89C6C00F295F"}]}]}],"references":[{"url":"https://github.com/uasoft-indonesia/badaso","source":"cve@mitre.org","tags":["Product"]},{"url":"https://medium.com/@pat.sanitjairak/remote-code-execution-in-a-plain-view-0f86f183543d","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]}]}}]}