CVE-2025-14532
Critical
|9.3Exploit Available
Plain English Summary
AI-powered analysis for quick understanding
An attacker can upload any type of file to the DobryCMS system without needing to log in, which could allow them to run malicious code on the server. This vulnerability affects versions below 5.0 and poses a critical risk to the security of the system.
Technical Description
DobryCMS's upload file functionality allows an unauthenticated remote attacker to upload files of any type and extension without restriction, which can result in Remote Code Execution. This issue was fixed in versions above 5.0.
CVSS Vector Analysis
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeChanged
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Est. Bounty
$8,000($5K-$15K)
Vendor Response
Grade APatched in 3 days
Quick Information
Published
Mar 2, 2026
about 1 month ago
Last Modified
Mar 5, 2026
about 1 month ago
Vendor
studiofabryka
Product
dorbycms