🔐 CVE Alert

CVE-2014-125126

UNKNOWN 0.0

Simple E-Document Arbitrary File Upload RCE

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

An unrestricted file upload vulnerability exists in Simple E-Document versions 3.0 to 3.1 that allows an unauthenticated attacker to bypass authentication by sending a specific cookie header (access=3) with HTTP requests. The application’s upload mechanism fails to restrict file types and does not validate or sanitize user-supplied input, allowing attackers to upload malicious .php scripts. Authentication can be bypassed entirely by supplying a specially crafted cookie (access=3), granting access to the upload functionality without valid credentials. If file uploads are enabled on the server, the attacker can upload a web shell and gain remote code execution with the privileges of the web server user, potentially leading to full system compromise.

CWE CWE-434 CWE-306
Vendor simple e-document
Product simple e-document
Published Jul 31, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for simple e-document simple e-document

Be the first to know when new unknown vulnerabilities affecting simple e-document simple e-document are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

Simple E-Document / Simple E-Document
3.0 ≤ 3.1

References

NVD ↗ CVE.org ↗ EPSS Data ↗
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/simple_e_document_upload_exec.rb exploit-db.com: https://www.exploit-db.com/exploits/31264 sourceforge.net: https://sourceforge.net/projects/simplee-doc/ vulncheck.com: https://www.vulncheck.com/advisories/simple-edocument-abitrary-file-upload-rce

Credits

vinicius777