Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 14 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:snewscms:snews:*:*:*:*:*:*:*:* |
Mon, 06 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 04 Apr 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Snews CMS 1.7 contains an unrestricted file upload vulnerability that allows unauthenticated attackers to upload arbitrary files including PHP executables to the snews_files directory. Attackers can upload malicious PHP files through the multipart form-data upload endpoint and execute them by accessing the uploaded file path to achieve remote code execution. | |
| Title | Snews CMS 1.7 Unrestricted File Upload via snews_files | |
| First Time appeared |
Snewscms
Snewscms snews |
|
| Weaknesses | CWE-434 | |
| CPEs | cpe:2.3:a:snewscms:snews:1.7:*:*:*:*:*:*:* | |
| Vendors & Products |
Snewscms
Snewscms snews |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-06T15:28:54.059Z
Reserved: 2026-04-04T13:33:00.414Z
Link: CVE-2016-20052
Updated: 2026-04-06T15:25:27.510Z
Status : Analyzed
Published: 2026-04-04T14:16:17.520
Modified: 2026-04-14T19:05:45.853
Link: CVE-2016-20052
No data.
OpenCVE Enrichment
Updated: 2026-04-15T16:30:09Z