CVE-2012-10038
Auxilium RateMyPet Arbitrary File Upload RCE
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
Auxilium RateMyPet contains an unauthenticated arbitrary file upload vulnerability in upload_banners.php. The banner upload feature fails to validate file types or enforce authentication, allowing remote attackers to upload malicious PHP files. These files are stored in a web-accessible /banners/ directory and can be executed directly, resulting in remote code execution.
| CWE | CWE-434 |
| Vendor | auxilium |
| Product | ratemypet |
| Published | Aug 11, 2025 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for auxilium ratemypet
Be the first to know when new unknown vulnerabilities affecting auxilium ratemypet are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Auxilium / RateMyPet
*
References
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/auxilium_upload_exec.rb exploit-db.com: https://www.exploit-db.com/exploits/21329 exploit-db.com: https://www.exploit-db.com/exploits/21836 web.archive.org: https://web.archive.org/web/20120331222419/http://www.auxiliumsoftware.com/
Credits
DaOne