Cyber Posture

CVE-2020-36942

HighPublic PoC

Published: 27 January 2026

Published
27 January 2026
Modified
10 February 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0012 29.9th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Victor CMS 1.0 contains a file upload vulnerability that allows authenticated users to upload malicious PHP files through the profile image upload feature. Attackers can upload a PHP shell to the /img directory and execute system commands by accessing the…

more

uploaded file via web browser.

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 mandates validation of all information inputs, including file uploads, to confirm proper format, MIME type, and content such as image magic bytes, directly preventing acceptance of malicious PHP files.

prevent

SI-9 enforces restrictions on input characteristics, limiting file uploads to authorized image types and sizes, blocking unrestricted upload of dangerous PHP shells.

prevent

SI-3 requires malicious code protection mechanisms at system entry points like upload interfaces to scan and block PHP shells before storage.

Security SummaryAI

CVE-2020-36942 is a file upload vulnerability in Victor CMS 1.0, specifically in the profile image upload feature. This flaw, associated with CWE-434 (Unrestricted Upload of File with Dangerous Type), enables authenticated users to upload malicious PHP files directly to the /img directory. The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for remote exploitation with low complexity and privileges.

An authenticated attacker with low privileges (PR:L) can exploit this vulnerability by uploading a PHP shell via the profile image upload functionality. Once uploaded to the /img directory, the attacker accesses the file through a web browser to execute arbitrary system commands, achieving remote code execution (RCE) with high impacts on confidentiality, integrity, and availability.

Advisories and related resources, including the Vulncheck advisory at https://www.vulncheck.com/advisories/victor-cms-file-upload-to-rce, an Exploit-DB proof-of-concept at https://www.exploit-db.com/exploits/49310, and the project repository at https://github.com/VictorAlagwu/CMSsite, provide further details on the issue, though specific patch or mitigation guidance is not detailed in the CVE description. Security practitioners should review these for remediation steps.

Details

CWE(s)

Affected Products

victor cms project
victor cms
1.0

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

The file upload vulnerability in a public-facing CMS enables exploitation of public-facing applications (T1190) by allowing authenticated attackers to upload PHP webshells to a web-accessible directory, facilitating web shell deployment (T1100) for remote code execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References