Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2014-9811 | An unrestricted file upload vulnerability exists in Simple E-Document versions 3.0 to 3.1 that allows an unauthenticated attacker to bypass authentication by sending a specific cookie header (access=3) with HTTP requests. The application’s upload mechanism fails to restrict file types and does not validate or sanitize user-supplied input, allowing attackers to upload malicious .php scripts. Authentication can be bypassed entirely by supplying a specially crafted cookie (access=3), granting access to the upload functionality without valid credentials. If file uploads are enabled on the server, the attacker can upload a web shell and gain remote code execution with the privileges of the web server user, potentially leading to full system compromise. |
Thu, 05 Mar 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | ||
| Vendors & Products |
Tecorange
Tecorange simple E-document |
Thu, 05 Mar 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tecorange
Tecorange simple E-document |
|
| CPEs | cpe:2.3:a:tecorange:simple_e-document:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Tecorange
Tecorange simple E-document |
Thu, 31 Jul 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 31 Jul 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An unrestricted file upload vulnerability exists in Simple E-Document versions 3.0 to 3.1 that allows an unauthenticated attacker to bypass authentication by sending a specific cookie header (access=3) with HTTP requests. The application’s upload mechanism fails to restrict file types and does not validate or sanitize user-supplied input, allowing attackers to upload malicious .php scripts. Authentication can be bypassed entirely by supplying a specially crafted cookie (access=3), granting access to the upload functionality without valid credentials. If file uploads are enabled on the server, the attacker can upload a web shell and gain remote code execution with the privileges of the web server user, potentially leading to full system compromise. | |
| Title | Simple E-Document Arbitrary File Upload RCE | |
| Weaknesses | CWE-306 CWE-434 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-14T02:06:25.762Z
Reserved: 2025-07-30T15:47:44.009Z
Link: CVE-2014-125126
Updated: 2025-07-31T15:26:50.226Z
Status : Deferred
Published: 2025-07-31T15:15:35.210
Modified: 2026-04-15T00:35:42.020
Link: CVE-2014-125126
No data.
OpenCVE Enrichment
No data.
EUVD