CVE-2015-7773
Description
Unrestricted file upload vulnerability in the Panel component in Bastian Allgeier Kirby before 2.1.2 allows remote authenticated users to execute arbitrary PHP code by uploading a file that lacks an extension, and then renaming this file to have a .php extension.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Kirby CMS Panel component before 2.1.2 allows authenticated users to upload arbitrary files and rename them to .php, leading to remote code execution.
Vulnerability
The Panel component in Bastian Allgeier Kirby before version 2.1.2 contains an unrestricted file upload vulnerability [1][2]. An authenticated user with access to the Panel can upload a file that lacks a file extension. The application does not validate the file type or require an extension, allowing the uploaded file to be stored on the server. Subsequently, the attacker can rename the uploaded file to have a .php extension, which the server then interprets as executable PHP code [1]. This affects Kirby 2.1.1 and earlier [2].
Exploitation
To exploit this vulnerability, an attacker must have a valid account with access to the Kirby Panel (authentication is required) [2]. The attacker uploads a file containing arbitrary PHP code but deliberately omits a file extension. After the upload, the attacker uses the Panel's file management functionality to rename the file, appending a .php extension. No additional user interaction or special network position is needed beyond being able to reach the Panel interface [1].
Impact
Successful exploitation allows the attacker to execute arbitrary PHP code on the server with the privileges of the web server process [1][2]. This can lead to full compromise of the CMS, including data theft, defacement, or further server-side attacks. The impact is rated as medium severity (CVSS v2 base score 6.5) with partial loss of confidentiality, integrity, and availability [2].
Mitigation
The vendor released Kirby version 2.1.2 to fix this vulnerability [1][2]. Users should update to 2.1.2 or later immediately. No workarounds are documented in the available references. The vulnerability is not listed in CISA's Known Exploited Vulnerabilities (KEV) catalog.
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
3cpe:2.3:a:bastian_allgeier:kirby:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:bastian_allgeier:kirby:*:*:*:*:*:*:*:*range: <=2.1.1
- (no CPE)range: < 2.1.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- getkirby.com/changelog/kirby-2-1-2nvdPatchVendor Advisory
- jvn.jp/en/jp/JVN34780384/index.htmlnvdVendor Advisory
- jvndb.jvn.jp/jvndb/JVNDB-2015-000182nvdVendor Advisory
News mentions
0No linked articles in our index yet.