CVE-2026-37748
Published: 21 April 2026
Summary
CVE-2026-37748 is a high-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Sanjay1313 Visitor Management System. Its CVSS base score is 7.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 26.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation of MIME type, file extension, and content for uploaded files, preventing unrestricted upload of PHP webshells.
Mandates identification, reporting, and correction of flaws like the unrestricted file upload in admin_user_insert.php and update_1.php.
Employs malicious code protection mechanisms with real-time scans at network entry points to block or detect PHP webshell uploads and execution.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unrestricted file upload without validation directly enables web shell deployment (T1100) via exploitation of a public-facing web application (T1190).
NVD Description
Visitor Management System 1.0 by sanjay1313 is vulnerable to Unrestricted File Upload in vms/php/admin_user_insert.php and vms/php/update_1.php. The move_uploaded_file() function is called without any MIME type, extension, or content validation, allowing an authenticated admin to upload a PHP webshell and achieve…
more
Remote Code Execution on the server.
Deeper analysisAI
CVE-2026-37748, published on 2026-04-21, is an unrestricted file upload vulnerability in Visitor Management System 1.0 developed by sanjay1313. The issue resides in the files vms/php/admin_user_insert.php and vms/php/update_1.php, where the move_uploaded_file() PHP function is invoked without validation of MIME type, file extension, or file content. This allows malicious files to be stored and executed on the server.
An authenticated administrator (PR:H) can exploit the vulnerability remotely (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). By uploading a PHP webshell, the attacker achieves remote code execution, leading to high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H) within the unchanged scope (S:U). The vulnerability carries a CVSS 3.1 base score of 7.2 and maps to CWE-434 (Unrestricted Upload of File with Dangerous Type).
Mitigation details and advisories are referenced in GitHub repositories, including https://github.com/menevarad007/CVE-2026-37748 and https://github.com/sanjay1313/Visitor-Management-System. Security practitioners should review these for patches, workarounds, or updated versions of the software.
Details
- CWE(s)