INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global data_breach Government CRITICAL 1h Global ransomware Financial Services / Cybersecurity CRITICAL 2h Global vulnerability Information Technology / Cybersecurity CRITICAL 4h Global malware Energy and Utilities CRITICAL 4h Global ransomware Multiple sectors CRITICAL 5h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 7h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 7h Global phishing Multiple sectors HIGH 8h Global insider Cybersecurity Services CRITICAL 8h Global ransomware Multiple sectors (U.S. companies) CRITICAL 8h Global data_breach Government CRITICAL 1h Global ransomware Financial Services / Cybersecurity CRITICAL 2h Global vulnerability Information Technology / Cybersecurity CRITICAL 4h Global malware Energy and Utilities CRITICAL 4h Global ransomware Multiple sectors CRITICAL 5h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 7h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 7h Global phishing Multiple sectors HIGH 8h Global insider Cybersecurity Services CRITICAL 8h Global ransomware Multiple sectors (U.S. companies) CRITICAL 8h Global data_breach Government CRITICAL 1h Global ransomware Financial Services / Cybersecurity CRITICAL 2h Global vulnerability Information Technology / Cybersecurity CRITICAL 4h Global malware Energy and Utilities CRITICAL 4h Global ransomware Multiple sectors CRITICAL 5h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 7h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 7h Global phishing Multiple sectors HIGH 8h Global insider Cybersecurity Services CRITICAL 8h Global ransomware Multiple sectors (U.S. companies) CRITICAL 8h
Vulnerabilities

CVE-2020-37073

High ⚡ Exploit Available
Victor CMS 1.0 contains an authenticated file upload vulnerability that allows administrators to upload PHP files with arbitrary content through the user_image parameter. Attackers can upload a malici
CWE-434 — Weakness Type
Published: Feb 3, 2026  ·  Modified: Feb 28, 2026  ·  Source: NVD
CVSS v3
8.8
🔗 NVD Official
📄 Description (English)

Victor CMS 1.0 contains an authenticated file upload vulnerability that allows administrators to upload PHP files with arbitrary content through the user_image parameter. Attackers can upload a malicious PHP shell to the /img/ directory and execute system commands by accessing the uploaded file with a 'cmd' parameter.

🤖 AI Executive Summary

Victor CMS 1.0 contains a critical authenticated file upload vulnerability (CVE-2020-37073) allowing administrators to upload malicious PHP files and execute arbitrary system commands. With CVSS 8.8 and publicly available exploits, this poses immediate risk to organizations using Victor CMS for content management. The vulnerability requires administrative access but enables complete system compromise once exploited.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 21, 2026 23:53
🇸🇦 Saudi Arabia Impact Assessment
Saudi government agencies, municipalities, and smaller enterprises using Victor CMS for website content management face direct compromise risk. The vulnerability particularly impacts: (1) Government digital services and e-government portals using Victor CMS, (2) Educational institutions managing institutional websites, (3) Small-to-medium enterprises in retail and services sectors, (4) Healthcare facilities with web-based patient portals. Compromised systems could lead to data exfiltration, website defacement, malware distribution, and lateral movement into critical infrastructure networks.
🏢 Affected Saudi Sectors
Government and Public Administration Education Healthcare Retail and E-commerce Small and Medium Enterprises Telecommunications
⚖️ Saudi Risk Score (AI)
8.2
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Identify all Victor CMS 1.0 instances in your environment using network scanning and asset inventory tools
2. Restrict administrative access to Victor CMS to trusted personnel only; implement principle of least privilege
3. Disable file upload functionality if not actively required
4. Monitor /img/ directory for suspicious PHP files and unexpected file modifications

PATCHING:
1. Upgrade Victor CMS to version 1.1 or later immediately (patch available)
2. If upgrade not immediately possible, apply vendor security patches
3. Test patches in non-production environment before deployment

COMPENSATING CONTROLS (if patching delayed):
1. Implement Web Application Firewall (WAF) rules to block PHP file uploads via user_image parameter
2. Configure web server to prevent PHP execution in /img/ directory (add .htaccess: php_flag engine off)
3. Implement file type validation at application and server level (whitelist only image MIME types)
4. Enable detailed logging of all file upload activities with alerting on PHP file uploads
5. Restrict /img/ directory permissions to read-only for web server process

DETECTION:
1. Monitor for POST requests to upload endpoints with suspicious file extensions
2. Alert on PHP files appearing in /img/ directory
3. Log and alert on cmd parameter usage in HTTP requests
4. Implement IDS/IPS signatures for Victor CMS exploitation attempts
5. Review web server access logs for execution of PHP files from /img/ directory
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع نسخ Victor CMS 1.0 في بيئتك باستخدام أدوات المسح والجرد
2. تقييد الوصول الإداري إلى Victor CMS للموظفين الموثوقين فقط
3. تعطيل وظيفة تحميل الملفات إذا لم تكن مطلوبة بنشاط
4. مراقبة دليل /img/ للملفات PHP المريبة والتعديلات غير المتوقعة

التصحيح:
1. ترقية Victor CMS إلى الإصدار 1.1 أو أحدث فوراً
2. إذا لم يكن الترقية ممكنة فوراً، طبق تصحيحات الأمان من المورد
3. اختبر التصحيحات في بيئة غير الإنتاج قبل النشر

الضوابط البديلة:
1. تطبيق قواعد جدار حماية تطبيقات الويب لحظر تحميل ملفات PHP
2. تكوين خادم الويب لمنع تنفيذ PHP في دليل /img/
3. تطبيق التحقق من نوع الملف على مستوى التطبيق والخادم
4. تفعيل تسجيل مفصل لجميع أنشطة تحميل الملفات
5. تقييد أذونات دليل /img/ للقراءة فقط

الكشف:
1. مراقبة طلبات POST المريبة إلى نقاط نهاية التحميل
2. التنبيه على ملفات PHP التي تظهر في دليل /img/
3. تسجيل والتنبيه على استخدام معامل cmd
4. تطبيق توقيعات IDS/IPS لمحاولات استغلال Victor CMS
5. مراجعة سجلات الوصول لخادم الويب
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
A.12.4.1 - Event logging and monitoring A.14.2.1 - Secure development policy A.14.2.5 - Secure development environment A.12.6.1 - Management of technical vulnerabilities
🔵 SAMA CSF
ID.RA-1 - Asset management and vulnerability identification PR.IP-12 - Software, firmware, and information integrity mechanisms DE.CM-1 - The network is monitored to detect potential cybersecurity events
🟡 ISO 27001:2022
A.12.2.1 - Restrictions on software installation A.12.6.1 - Management of technical vulnerabilities A.14.2.1 - Secure development policy A.14.2.5 - Secure development environment
🟣 PCI DSS v4.0
6.2 - Ensure all system components and software are protected from known vulnerabilities 6.5.8 - Improper access control (file upload vulnerability)
📦 Affected Products / CPE 1 entries
victor_cms_project:victor_cms:1.0
📊 CVSS Score
8.8
/ 10.0 — High
📊 CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorN — None / Network
Attack ComplexityL — Low / Local
Privileges RequiredL — Low / Local
User InteractionN — None / Network
ScopeU — Unchanged
ConfidentialityH — High
IntegrityH — High
AvailabilityH — High
📋 Quick Facts
Severity High
CVSS Score8.8
CWECWE-434
EPSS0.08%
Exploit ✓ Yes
Patch ✓ Yes
Published 2026-02-03
Source Feed nvd
Views 2
🇸🇦 Saudi Risk Score
8.2
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
exploit-available CWE-434
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.