UnoPim vulnerable to remote code execution through Arbitrary File upload
Description
UnoPim is an open-source Product Information Management (PIM) system built on the Laravel framework. Before 0.2.1, the image upload at the user creation feature performs only client side file type validation. A user can capture the request by uploading an image, capture the request through a Proxy like Burp suite. Make changes to the file extension and content. The vulnerability is fixed in 0.2.1.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
UnoPim before 0.2.1 allows arbitrary file upload leading to RCE via client-side validation bypass in user profile image.
Vulnerability
Overview CVE-2025-55743 is an arbitrary file upload vulnerability in UnoPim, an open-source PIM system built on Laravel. The user creation feature's image upload only performs client-side file type validation, allowing an attacker to intercept the upload request (e.g., via a proxy like Burp Suite) and modify both the file extension and content to a malicious PHP script [1][3].
Exploitation
An attacker can upload a PHP webshell by changing the multipart form data: the filename to poc.php and the content to PHP code (e.g., <?php system($_GET['cmd']); ?>). The uploaded file is stored on the server and accessible via a URL like /storage/admins/{id}/poc.php. By accessing that URL with a command parameter, the attacker achieves remote code execution [3].
Impact
Successful exploitation allows any authenticated user (who can change their profile picture) to execute arbitrary system commands. This can lead to full server compromise, data theft, or lateral movement within the network. The vulnerability is rated high severity due to the potential for complete system takeover [3].
Mitigation
The issue is fixed in UnoPim version 0.2.1. Users should upgrade immediately. No workarounds are available [1][3].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
unopim/unopimPackagist | < 0.2.1 | 0.2.1 |
Affected products
2- unopim/unopimv5Range: < 0.2.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-v22v-xwh7-2vrmghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-55743ghsaADVISORY
- drive.proton.me/urls/PH1ESMKHMWghsax_refsource_MISCWEB
- github.com/unopim/unopim/security/advisories/GHSA-v22v-xwh7-2vrmghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.