Cyber Posture

CVE-2016-20052

CriticalPublic PoC

Published: 04 April 2026

Published
04 April 2026
Modified
14 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0044 63.3th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2016-20052 is a critical-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Snewscms Snews. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 36.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires timely identification, reporting, and correction of the software flaw enabling unrestricted file uploads leading to RCE.

prevent

Mandates validation of file upload inputs to reject dangerous types like PHP executables, directly preventing exploitation of the unrestricted upload vulnerability.

prevent

Enforces access control policies on the multipart form-data upload endpoint to block unauthenticated attackers from uploading arbitrary files.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is an unrestricted file upload in a public-facing web application (Snews CMS), enabling unauthenticated remote code execution, which directly maps to exploitation of public-facing applications.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Snews CMS 1.7 contains an unrestricted file upload vulnerability that allows unauthenticated attackers to upload arbitrary files including PHP executables to the snews_files directory. Attackers can upload malicious PHP files through the multipart form-data upload endpoint and execute them by…

more

accessing the uploaded file path to achieve remote code execution.

Deeper analysisAI

CVE-2016-20052 is an unrestricted file upload vulnerability in Snews CMS version 1.7. The flaw resides in the file upload functionality, which allows attackers to upload arbitrary files, including PHP executables, to the snews_files directory via a multipart form-data upload endpoint. This issue is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), denoting critical severity.

Unauthenticated attackers can exploit the vulnerability over the network with low complexity and no user interaction required. By uploading a malicious PHP file through the exposed endpoint, they gain the ability to execute arbitrary code by directly accessing the uploaded file's path in the snews_files directory, resulting in remote code execution on the server.

Advisories and references highlight the issue but do not specify patches or mitigations in the available details. Relevant resources include an Exploit-DB entry with a proof-of-concept (https://www.exploit-db.com/exploits/40706) and a VulnCheck advisory (https://www.vulncheck.com/advisories/snews-cms-unrestricted-file-upload-via-snews-files). Security practitioners should verify for updates from the vendor and restrict file upload endpoints where possible.

Details

CWE(s)

Affected Products

snewscms
snews
≤ 1.7

CVEs Like This One

CVE-2025-54440Shared CWE-434
CVE-2024-56828Shared CWE-434
CVE-2025-34299Shared CWE-434
CVE-2022-50936Shared CWE-434
CVE-2025-12673Shared CWE-434
CVE-2025-13067Shared CWE-434
CVE-2026-3459Shared CWE-434
CVE-2025-48396Shared CWE-434
CVE-2025-67325Shared CWE-434
CVE-2023-50897Shared CWE-434

References