{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-58279","assignerOrgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","state":"PUBLISHED","assignerShortName":"VulnCheck","dateReserved":"2025-12-10T14:35:24.454Z","datePublished":"2025-12-10T21:12:47.259Z","dateUpdated":"2026-04-07T14:08:32.855Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"appRain CMF","vendor":"apprain","versions":[{"status":"affected","version":"4.0.5"}]}],"credits":[{"lang":"en","type":"finder","value":"Ahmet Ümit BAYRAM"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>appRain CMF 4.0.5 contains an authenticated remote code execution vulnerability that allows administrative users to upload malicious PHP files through the filemanager upload endpoint. Attackers can leverage authenticated access to generate a web shell with command execution capabilities by uploading a crafted PHP file to the site's uploads directory.</p>"}],"value":"appRain CMF 4.0.5 contains an authenticated remote code execution vulnerability that allows administrative users to upload malicious PHP files through the filemanager upload endpoint. Attackers can leverage authenticated access to generate a web shell with command execution capabilities by uploading a crafted PHP file to the site's uploads directory."}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":8.6,"baseSeverity":"HIGH","exploitMaturity":"NOT_DEFINED","privilegesRequired":"HIGH","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-434","description":"CWE-434 Unrestricted Upload of File with Dangerous Type","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","shortName":"VulnCheck","dateUpdated":"2026-04-07T14:08:32.855Z"},"references":[{"name":"ExploitDB-52041","tags":["exploit"],"url":"https://www.exploit-db.com/exploits/52041"},{"name":"Official Vendor Homepage","tags":["vendor-advisory","product"],"url":"https://www.apprain.org"},{"name":"Software Link","tags":["product"],"url":"https://github.com/apprain/apprain/archive/refs/tags/v4.0.5.zip"},{"name":"VulnCheck Advisory: appRain CMF 4.0.5 Authenticated Remote Code Execution via Filemanager Upload","tags":["third-party-advisory"],"url":"https://www.vulncheck.com/advisories/apprain-cmf-authenticated-remote-code-execution-via-filemanager-upload"}],"source":{"discovery":"UNKNOWN"},"title":"appRain CMF 4.0.5 Authenticated Remote Code Execution via Filemanager Upload","x_generator":{"engine":"vulncheck"},"datePublic":"2024-06-03T00:00:00.000Z"},"adp":[{"references":[{"url":"https://github.com/apprain/apprain/archive/refs/tags/v4.0.5.zip","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-11T15:50:56.092282Z","id":"CVE-2024-58279","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-11T18:51:57.014Z"}}]}}