CVE-2016-20052
Published: 04 April 2026
Summary
CVE-2016-20052 is a critical-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Snewscms Snews. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 36.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires timely identification, reporting, and correction of the software flaw enabling unrestricted file uploads leading to RCE.
Mandates validation of file upload inputs to reject dangerous types like PHP executables, directly preventing exploitation of the unrestricted upload vulnerability.
Enforces access control policies on the multipart form-data upload endpoint to block unauthenticated attackers from uploading arbitrary files.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is an unrestricted file upload in a public-facing web application (Snews CMS), enabling unauthenticated remote code execution, which directly maps to exploitation of public-facing applications.
NVD Description
Snews CMS 1.7 contains an unrestricted file upload vulnerability that allows unauthenticated attackers to upload arbitrary files including PHP executables to the snews_files directory. Attackers can upload malicious PHP files through the multipart form-data upload endpoint and execute them by…
more
accessing the uploaded file path to achieve remote code execution.
Deeper analysisAI
CVE-2016-20052 is an unrestricted file upload vulnerability in Snews CMS version 1.7. The flaw resides in the file upload functionality, which allows attackers to upload arbitrary files, including PHP executables, to the snews_files directory via a multipart form-data upload endpoint. This issue is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), denoting critical severity.
Unauthenticated attackers can exploit the vulnerability over the network with low complexity and no user interaction required. By uploading a malicious PHP file through the exposed endpoint, they gain the ability to execute arbitrary code by directly accessing the uploaded file's path in the snews_files directory, resulting in remote code execution on the server.
Advisories and references highlight the issue but do not specify patches or mitigations in the available details. Relevant resources include an Exploit-DB entry with a proof-of-concept (https://www.exploit-db.com/exploits/40706) and a VulnCheck advisory (https://www.vulncheck.com/advisories/snews-cms-unrestricted-file-upload-via-snews-files). Security practitioners should verify for updates from the vendor and restrict file upload endpoints where possible.
Details
- CWE(s)