{"vulnerability": "CVE-2020-25042", "sightings": [{"uuid": "c44082f6-220c-4e3e-8bc9-60e55be9021e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-25042", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/maracms_upload_exec.rb", "content": "", "creation_timestamp": "2020-09-25T18:36:20.000000Z"}, {"uuid": "da539081-4f70-40d5-96b8-e22b0b5d285d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-25042", "type": "seen", "source": "https://t.me/arpsyndicate/1923", "content": "#ExploitObserverAlert\n\nCVE-2020-25042\n\nDESCRIPTION: Exploit Observer has 6 entries related to CVE-2020-25042. An arbitrary file upload issue exists in Mara CMS 7.5. In order to exploit this, an attacker must have a valid authenticated (admin/manager) session and make a codebase/dir.php?type=filenew request to upload PHP code to codebase/handler.php.\n\nFIRST-EPSS: 0.503940000\nNVD-IS: 5.9\nNVD-ES: 1.2", "creation_timestamp": "2023-12-18T05:34:47.000000Z"}, {"uuid": "a584413f-f86a-44cc-a66a-2afe17a692b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-25042", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:44.000000Z"}, {"uuid": "248b61b4-1470-4104-9972-ad47c46052d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-25042", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:26.000000Z"}]}