Cyber Posture

CVE-2026-40040

HighPublic PoC

Published: 13 April 2026

Published
13 April 2026
Modified
17 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0011 29.0th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Pachno 1.0.6 contains an unrestricted file upload vulnerability that allows authenticated users to upload arbitrary file types by bypassing ineffective extension filtering to the /uploadfile endpoint. Attackers can upload executable files .php5 scripts to web-accessible directories and execute them to…

more

achieve remote code execution on the server.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces comprehensive validation of information inputs, directly addressing the ineffective extension filtering that allows arbitrary executable file uploads like .php5 scripts.

prevent

Requires timely identification, reporting, and remediation of software flaws such as this unrestricted file upload vulnerability to prevent RCE exploitation.

preventdetect

Deploys malicious code protection mechanisms to scan and block or detect dangerous uploaded files, such as executable scripts, before they can be executed.

Security SummaryAI

CVE-2026-40040 is an unrestricted file upload vulnerability in Pachno version 1.0.6, stemming from ineffective extension filtering at the /uploadfile endpoint. This flaw, classified under CWE-434 (Unrestricted Upload of File with Dangerous Type), enables authenticated users to upload arbitrary file types, including executable .php5 scripts, to web-accessible directories. The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), highlighting its high severity due to network accessibility, low attack complexity, and potential for complete compromise of confidentiality, integrity, and availability.

Authenticated users with low privileges can exploit this vulnerability remotely by bypassing the extension checks and uploading malicious files, such as .php5 scripts, to locations executable by the web server. Successful exploitation leads to remote code execution (RCE) on the affected server, allowing attackers to run arbitrary commands, potentially resulting in full server takeover.

Advisories published by VulnCheck (https://www.vulncheck.com/advisories/pachno-unrestricted-file-upload-remote-code-execution) and Zero Science Lab (https://www.zeroscience.mk/en/vulnerabilities/ZSL-2026-5982.php) provide detailed technical analysis of the vulnerability, including proof-of-concept exploitation steps. Practitioners should consult these resources for specific mitigation guidance, such as upgrading to a patched version of Pachno if available.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

The vulnerability allows unrestricted file upload of executable scripts (e.g., .php5) to web-accessible directories in a public-facing web application, enabling exploitation of public-facing applications (T1190) and deployment/execution of web shells (T1100) for RCE.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References