{"uuid": "de900b82-0a61-41f7-88a7-b2b4e0b29415", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-26048", "type": "seen", "source": "https://t.me/arpsyndicate/2186", "content": "#ExploitObserverAlert\n\nCVE-2020-26048\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2020-26048. The file manager option in CuppaCMS before 2019-11-12 allows an authenticated attacker to upload a malicious file within an image extension and through a custom request using the rename function provided by the file manager is able to modify the image extension into PHP resulting in remote arbitrary code execution.\n\nFIRST-EPSS: 0.002900000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2023-12-28T03:50:57.000000Z"}