CVE-2025-32957
HIGHbaserCMS is a website development framework. Prior to version 5.2.3, the application's restore function allows users to upload a .zip file, which is then automatically extracted. A PHP file inside the archive is included using require_once without validating or restricting the filename. An attacker can craft a malicious PHP file within the zip and achieve arbitrary code execution when it is included. This issue has been patched in version 5.2.3.
Published: 3/31/2026Modified: 4/1/2026
References (4)
https://basercms.net/security/JVN_20837860Vendor Advisoryhttps://github.com/baserproject/basercms/releases/tag/5.2.3Release Noteshttps://github.com/baserproject/basercms/security/advisories/GHSA-hv78-cwp4-8r7rExploitVendor Advisoryhttps://github.com/baserproject/basercms/security/advisories/GHSA-hv78-cwp4-8r7rExploitVendor Advisory