CVE-2012-10052
EGallery 1.2 Arbitrary PHP File Upload
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
EGallery version 1.2 contains an unauthenticated arbitrary file upload vulnerability in the uploadify.php script. The application fails to validate file types or enforce authentication, allowing remote attackers to upload malicious PHP files directly into the web-accessible egallery/ directory. This results in full remote code execution under the web server context.
| CWE | CWE-434 |
| Vendor | egallery |
| Product | egallery |
| Published | Aug 8, 2025 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for egallery egallery
Be the first to know when new unknown vulnerabilities affecting egallery egallery are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
EGallery / EGallery
1.2
References
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/egallery_upload_exec.rb exploit-db.com: https://www.exploit-db.com/exploits/20029 web.archive.org: http://web.archive.org/web/20170128123244/http://www.opensyscom.fr/Actualites/egallery-arbitrary-file-upload-vulnerability.html sourceforge.net: https://sourceforge.net/projects/e-gallery/ vulncheck.com: https://www.vulncheck.com/advisories/egallery-arbitrary-php-file-upload
Credits
Sammy FORGIT