Remote Code Execution Vulnerability in Narcissus Image Configuration
CVE-2012-10033
Key Information:
- Status
- Vendor
- CVE Published:
- 5 August 2025
Badges
What is CVE-2012-10033?
Narcissus, a web application utilized for image processing, exhibits a significant vulnerability allowing for remote code execution. This issue arises from insufficient sanitization of user input in the backend.php script during the image configuration workflow. Specifically, the release parameter is passed directly to the configure_image() function without proper validation. This oversight enables attackers to exploit the vulnerability via crafted POST requests, potentially executing arbitrary commands within the context of the web server. It is crucial for users of Narcissus to be aware of this vulnerability and implement necessary security measures.
Affected Version(s)
Narcissus *
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
60% chance of being exploited in the next 30 days.
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved
