Cyber Posture

CVE-2026-37748

HighPublic PoC

Published: 21 April 2026

Published
21 April 2026
Modified
22 April 2026
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0010 26.6th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-37748 is a high-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Sanjay1313 Visitor Management System. Its CVSS base score is 7.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 26.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation of MIME type, file extension, and content for uploaded files, preventing unrestricted upload of PHP webshells.

prevent

Mandates identification, reporting, and correction of flaws like the unrestricted file upload in admin_user_insert.php and update_1.php.

preventdetect

Employs malicious code protection mechanisms with real-time scans at network entry points to block or detect PHP webshell uploads and execution.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1100 Web Shell Persistence
A Web shell is a Web script that is placed on an openly accessible Web server to allow an adversary to use the Web server as a gateway into a network.
Why these techniques?

Unrestricted file upload without validation directly enables web shell deployment (T1100) via exploitation of a public-facing web application (T1190).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Visitor Management System 1.0 by sanjay1313 is vulnerable to Unrestricted File Upload in vms/php/admin_user_insert.php and vms/php/update_1.php. The move_uploaded_file() function is called without any MIME type, extension, or content validation, allowing an authenticated admin to upload a PHP webshell and achieve…

more

Remote Code Execution on the server.

Deeper analysisAI

CVE-2026-37748, published on 2026-04-21, is an unrestricted file upload vulnerability in Visitor Management System 1.0 developed by sanjay1313. The issue resides in the files vms/php/admin_user_insert.php and vms/php/update_1.php, where the move_uploaded_file() PHP function is invoked without validation of MIME type, file extension, or file content. This allows malicious files to be stored and executed on the server.

An authenticated administrator (PR:H) can exploit the vulnerability remotely (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). By uploading a PHP webshell, the attacker achieves remote code execution, leading to high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H) within the unchanged scope (S:U). The vulnerability carries a CVSS 3.1 base score of 7.2 and maps to CWE-434 (Unrestricted Upload of File with Dangerous Type).

Mitigation details and advisories are referenced in GitHub repositories, including https://github.com/menevarad007/CVE-2026-37748 and https://github.com/sanjay1313/Visitor-Management-System. Security practitioners should review these for patches, workarounds, or updated versions of the software.

Details

CWE(s)

Affected Products

sanjay1313
visitor management system
1.0

CVEs Like This One

CVE-2025-49387Shared CWE-434
CVE-2025-52353Shared CWE-434
CVE-2025-25790Shared CWE-434
CVE-2025-22504Shared CWE-434
CVE-2026-33717Shared CWE-434
CVE-2025-14894Shared CWE-434
CVE-2025-65783Shared CWE-434
CVE-2025-44658Shared CWE-434
CVE-2025-50002Shared CWE-434
CVE-2026-1222Shared CWE-434

References