{"id":"CVE-2022-48006","details":"An arbitrary file upload vulnerability in taocms v3.0.2 allows attackers to execute arbitrary code via a crafted PHP file. This vulnerability is exploited via manipulation of the upext variable at /include/Model/Upload.php.","modified":"2026-03-14T11:56:02.501631Z","published":"2023-01-30T22:15:12.463Z","references":[{"type":"REPORT","url":"https://github.com/taogogo/taocms/issues/35"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/taogogo/taocms","events":[{"introduced":"0"},{"last_affected":"8dde383590d6d1858ebc967d785e0cdce44f8ccf"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.0.2"}]}}],"versions":["3.0.1","3.0.2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48006.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}