CVE-2023-36097: fuadmin vulnerable to insecure file upload
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.54103%
CWE
Published
6/22/2023
Updated
11/10/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| funadmin/funadmin | composer | >= 3.3.2, <= 3.3.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
- The vulnerability report explicitly references app/backend/controller/Addon.php#localinstall as the vulnerable location
- The method accepts ZIP files without validating file contents, enabling PHP file uploads
- Proof-of-concept demonstrates direct webshell execution via uploaded PHP files
- CWE-434 alignment confirms this is an unrestricted dangerous file upload scenario
- Issue reporter provided technical details showing direct correlation between this function and the exploit chain