Admidio is an open-source user management solution. Versions 5.0.6 and below contain a critical unrestricted file upload vulnerability in the Documents & Files module. Due to a design flaw in how CSRF token validation and file extension verification interact within UploadHandlerFile.php, an authenticated user with upload permissions can bypass file extension restrictions by intentionally submitting an invalid CSRF token. This allows the upload of arbitrary file types, including PHP scripts, which may lead to Remote Code Execution on the server, resulting in full server compromise, data exfiltration, and lateral movement. This issue has been fixed in version 5.0.7.
References
| Link | Resource |
|---|---|
| https://github.com/Admidio/admidio/releases/tag/v5.0.7 | Patch Product |
| https://github.com/Admidio/admidio/security/advisories/GHSA-95cq-p4w2-32w5 | Exploit Mitigation Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-20 00:16
Updated : 2026-03-23 16:51
NVD link : CVE-2026-32756
Mitre link : CVE-2026-32756
CVE.ORG link : CVE-2026-32756
JSON object : View
Products Affected
admidio
- admidio
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
