CVE-2025-46099

In Pluck CMS 4.7.20-dev, an authenticated attacker can upload or create a crafted PHP file under the albums module directory and access it via the module routing logic in albums.site.php, resulting in arbitrary command execution through a GET parameter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pluck-cms:pluck:4.7.20:dev:*:*:*:*:*:*

History

14 Oct 2025, 14:10

Type Values Removed Values Added
References () http://pluck.com - () http://pluck.com - Broken Link
References () https://github.com/0xC4J/CVE-Lists/blob/main/CVE-2025-46099/CVE-2025-46099.md - () https://github.com/0xC4J/CVE-Lists/blob/main/CVE-2025-46099/CVE-2025-46099.md - Third Party Advisory
CVSS v2 : unknown
v3 : 7.1
v2 : unknown
v3 : 7.2
First Time Pluck-cms
Pluck-cms pluck
Summary
  • (es) En Pluck CMS 4.7.20-dev, un atacante autenticado puede cargar o manipular un archivo PHP manipulado en el directorio del módulo de álbumes y acceder a él a través de la lógica de enrutamiento del módulo en albums.site.php, lo que da como resultado la ejecución de un comando arbitrario a través de un parámetro GET.
CPE cpe:2.3:a:pluck-cms:pluck:4.7.20:dev:*:*:*:*:*:*

23 Jul 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-23 14:15

Updated : 2025-10-14 14:10


NVD link : CVE-2025-46099

Mitre link : CVE-2025-46099

CVE.ORG link : CVE-2025-46099


JSON object : View

Products Affected

pluck-cms

  • pluck
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type