Loading
rConfig 3.9.4 is vulnerable to remote code execution due to improper validation in the file upload functionality. vendor.crud.php accepts a file upload by checking content-type without considering the file extension and header. Thus, an attacker can exploit this by uploading a .php file to vendor.php that contains arbitrary PHP code and changing the content-type to image/gif.
Use CWE-434, Rconfig vendor hub and Rconfig product page to widen CVE-2020-12255 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2020-25359, CVE-2023-39110 and CVE-2023-39109 for nearby disclosures in the same product family.