LeptonCMS version 7.3.0 contains an arbitrary file upload vulnerability, which is caused by the lack of proper validation for uploaded files. An authenticated attacker can exploit this vulnerability by uploading a specially crafted ZIP/PHP file to execute arbitrary code.
References
| Link | Resource |
|---|---|
| http://lepton.com | Not Applicable |
| https://github.com/Kayi626/Vulns/blob/UserAccount/LEPTON_CMS_7.3.0_File_Upload_A.pdf | Exploit Third Party Advisory |
| https://github.com/Kayi626/Vulns/blob/UserAccount/LEPTON_CMS_7.3.0_File_Upload_B.pdf | Exploit Third Party Advisory |
| https://github.com/Kayi626/Vulns/blob/UserAccount/LEPTON_CMS_7.3.0_File_Upload_C.pdf | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-12-09 17:15
Updated : 2025-12-11 20:16
NVD link : CVE-2025-56704
Mitre link : CVE-2025-56704
CVE.ORG link : CVE-2025-56704
JSON object : View
Products Affected
lepton-cms
- leptoncms
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
