{"id":"CVE-2023-38836","details":"File Upload vulnerability in BoidCMS v.2.0.0 allows a remote attacker to execute arbitrary code by adding a GIF header to bypass MIME type checks.","modified":"2026-04-12T07:18:45.607404Z","published":"2023-08-21T17:15:47.633Z","references":[{"type":"WEB","url":"http://boidcms.com"},{"type":"WEB","url":"http://packetstormsecurity.com/files/175026/BoidCMS-2.0.0-Shell-Upload.html"},{"type":"REPORT","url":"https://github.com/BoidCMS/BoidCMS/issues/27"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/boidcms/boidcms","events":[{"introduced":"0"},{"last_affected":"6bb909b1b9029264f77462d6c192e9f357ec2912"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"2.0.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:boidcms:boidcms:2.0.0:*:*:*:*:*:*:*"}}],"versions":["v1.0.0","v1.0.1","v2.0.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-38836.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}