Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1107: Unrestricted Upload in EyouCMS

0
Medium
VulnerabilityCVE-2026-1107cvecve-2026-1107
Published: Sun Jan 18 2026 (01/18/2026, 00:32:06 UTC)
Source: CVE Database V5
Product: EyouCMS

Description

A weakness has been identified in EyouCMS up to 1.7.1/5.0. Impacted is the function check_userinfo of the file Diyajax.php of the component Member Avatar Handler. Executing a manipulation of the argument viewfile can lead to unrestricted upload. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 01/25/2026, 19:46:48 UTC

Technical Analysis

CVE-2026-1107 is a vulnerability identified in EyouCMS versions 1.7.0, 1.7.1, and 5.0, specifically in the Member Avatar Handler component's check_userinfo function located in the Diyajax.php file. The flaw stems from insufficient validation of the 'viewfile' parameter, which can be manipulated remotely to perform unrestricted file uploads. This means an attacker can upload arbitrary files, including potentially malicious scripts, without requiring authentication or user interaction. The vulnerability is exploitable over the network (AV:N) with low attack complexity (AC:L) and no privileges required (PR:L indicates limited privileges but effectively no authentication needed for exploitation). The impact on confidentiality, integrity, and availability is low to limited individually but combined can lead to significant compromise such as remote code execution or defacement. The vendor was notified early but has not issued a patch or response, and the exploit code has been publicly released, increasing the urgency for mitigation. No known active exploitation has been reported yet. The CVSS 4.0 base score is 5.3, categorizing it as medium severity. The vulnerability does not require user interaction and affects the web application layer, making it a critical concern for web servers running EyouCMS. The lack of vendor response necessitates that organizations implement their own mitigations and monitoring to reduce risk.

Potential Impact

For European organizations, the unrestricted file upload vulnerability in EyouCMS could lead to unauthorized remote code execution, website defacement, data leakage, or pivoting within internal networks. Organizations relying on EyouCMS for public-facing websites or intranet portals are particularly vulnerable, as attackers can upload web shells or malware to gain persistent access. This could disrupt business operations, damage reputation, and lead to regulatory non-compliance under GDPR if personal data is compromised. The medium severity score reflects that while exploitation is straightforward and remote, the impact depends on the attacker's payload and the organization's security posture. Given the lack of vendor patching, European entities must be vigilant, as attackers may target these systems opportunistically. The potential for lateral movement and further compromise increases risk in interconnected environments common in European enterprises. Additionally, sectors such as government, education, and SMEs using EyouCMS may face heightened exposure due to limited security resources.

Mitigation Recommendations

Since no official patch is available, European organizations should immediately implement strict input validation on the 'viewfile' parameter to prevent arbitrary file uploads. Employ web application firewalls (WAFs) with custom rules to block suspicious upload attempts targeting Diyajax.php and the Member Avatar Handler. Restrict allowed file types and enforce file size limits on uploads. Disable or restrict the vulnerable functionality if it is not critical to operations. Conduct regular file integrity monitoring on upload directories to detect unauthorized changes. Apply network segmentation to isolate web servers running EyouCMS from sensitive internal systems. Monitor logs for unusual activity related to file uploads and access to Diyajax.php. Educate administrators on the risk and ensure timely incident response readiness. Consider migrating to alternative CMS platforms if vendor support remains absent. Finally, maintain up-to-date backups to enable recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-17T08:41:54.975Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696c2fcdd302b072d943efc4

Added to database: 1/18/2026, 12:56:45 AM

Last enriched: 1/25/2026, 7:46:48 PM

Last updated: 2/7/2026, 11:36:56 AM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats