๐Ÿ” CVE Alert

CVE-2013-10067

UNKNOWN 0.0

Glossword 1.8.8 - 1.8.12 Arbitrary File Upload RCE

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Glossword versions 1.8.8 through 1.8.12 contain an authenticated arbitrary file upload vulnerability. When deployed as a standalone application, the administrative interface (gw_admin.php) allows users with administrator privileges to upload files to the gw_temp/a/ directory. Due to insufficient validation of file type and path, attackers can upload and execute PHP payloads, resulting in remote code execution.

CWE CWE-434
Vendor glossword team
Product glossword
Published Aug 5, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for glossword team glossword

Be the first to know when new unknown vulnerabilities affecting glossword team glossword are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Glossword Team / Glossword
1.8.8 โ‰ค 1.8.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/glossword_upload_exec.rb exploit-db.com: https://www.exploit-db.com/exploits/24456 exploit-db.com: https://www.exploit-db.com/exploits/24548 github.com: https://github.com/glosswordteam/Glossword sourceforge.net: https://sourceforge.net/projects/glossword/ vulncheck.com: https://www.vulncheck.com/advisories/glossword-arbitrary-file-upload-rce

Credits

AkaStep