Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-hv78-cwp4-8r7r | baserCMS has Unsafe File Upload Leading to Remote Code Execution (RCE) |
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Baserproject
Baserproject basercms |
|
| Vendors & Products |
Baserproject
Baserproject basercms |
Wed, 01 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Basercms
Basercms basercms |
|
| CPEs | cpe:2.3:a:basercms:basercms:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Basercms
Basercms basercms |
Tue, 31 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 31 Mar 2026 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | baserCMS is a website development framework. Prior to version 5.2.3, the application's restore function allows users to upload a .zip file, which is then automatically extracted. A PHP file inside the archive is included using require_once without validating or restricting the filename. An attacker can craft a malicious PHP file within the zip and achieve arbitrary code execution when it is included. This issue has been patched in version 5.2.3. | |
| Title | baserCMS: unsafe File Upload Leading to Remote Code Execution (RCE) | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-31T19:09:23.581Z
Reserved: 2025-04-14T21:47:11.452Z
Link: CVE-2025-32957
Updated: 2026-03-31T19:05:50.145Z
Status : Analyzed
Published: 2026-03-31T01:16:34.530
Modified: 2026-04-01T20:31:57.590
Link: CVE-2025-32957
No data.
OpenCVE Enrichment
Updated: 2026-04-03T09:10:48Z
Github GHSA