{"api_version":"1","generated_at":"2026-05-15T07:55:14+00:00","cve":"CVE-2006-0658","urls":{"html":"https://cve.report/CVE-2006-0658","api":"https://cve.report/api/cve/CVE-2006-0658.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2006-0658","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2006-0658"},"summary":{"title":"CVE-2006-0658","description":"Incomplete blacklist vulnerability in connector.php in FCKeditor 2.0 and 2.2, as used in products such as RunCMS, allows remote attackers to upload and execute arbitrary script files by giving the files specific extensions that are not listed in the Config[DeniedExtensions][File], such as .php.txt.","state":"PUBLISHED","assigner":"mitre","published_at":"2006-02-13 11:06:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"5","severity":"","vector":"AV:N/AC:L/Au:N/C:N/I:P/A:N","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"}}],"references":[{"url":"https://www.exploit-db.com/exploits/3702","name":"https://www.exploit-db.com/exploits/3702","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"InoutMailingListManager 3.1 - Remote Command Execution - PHP webapps Exploit","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/0502","name":"http://www.vupen.com/english/advisories/2006/0502","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/18767","name":"http://secunia.com/advisories/18767","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"FCKeditor File Upload Vulnerability - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/424708","name":"http://www.securityfocus.com/archive/1/424708","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://retrogod.altervista.org/fckeditor_22_xpl.html","name":"http://retrogod.altervista.org/fckeditor_22_xpl.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"],"title":"Error 404 :(","mime":"text/plain","httpstatus":"404","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2006-0658","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-0658","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2006","cve_id":"658","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"fckeditor","cpe5":"fckeditor","cpe6":"2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"658","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"fckeditor","cpe5":"fckeditor","cpe6":"2.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2006","cve_id":"658","cve":"CVE-2006-0658","epss":"0.056760000","percentile":"0.904060000","score_date":"2026-04-16","updated_at":"2026-04-17 00:09:25"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T16:41:29.139Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"http://retrogod.altervista.org/fckeditor_22_xpl.html"},{"name":"ADV-2006-0502","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/0502"},{"name":"20060209 runCMS <= 1.3a2 possible remote code execution through the integrated FCKEditor package","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/424708"},{"name":"18767","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18767"},{"name":"3702","tags":["exploit","x_refsource_EXPLOIT-DB","x_transferred"],"url":"https://www.exploit-db.com/exploits/3702"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2006-02-10T00:00:00.000Z","descriptions":[{"lang":"en","value":"Incomplete blacklist vulnerability in connector.php in FCKeditor 2.0 and 2.2, as used in products such as RunCMS, allows remote attackers to upload and execute arbitrary script files by giving the files specific extensions that are not listed in the Config[DeniedExtensions][File], such as .php.txt."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-10-10T00:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"tags":["x_refsource_MISC"],"url":"http://retrogod.altervista.org/fckeditor_22_xpl.html"},{"name":"ADV-2006-0502","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/0502"},{"name":"20060209 runCMS <= 1.3a2 possible remote code execution through the integrated FCKEditor package","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/424708"},{"name":"18767","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18767"},{"name":"3702","tags":["exploit","x_refsource_EXPLOIT-DB"],"url":"https://www.exploit-db.com/exploits/3702"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2006-0658","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Incomplete blacklist vulnerability in connector.php in FCKeditor 2.0 and 2.2, as used in products such as RunCMS, allows remote attackers to upload and execute arbitrary script files by giving the files specific extensions that are not listed in the Config[DeniedExtensions][File], such as .php.txt."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"http://retrogod.altervista.org/fckeditor_22_xpl.html","refsource":"MISC","url":"http://retrogod.altervista.org/fckeditor_22_xpl.html"},{"name":"ADV-2006-0502","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/0502"},{"name":"20060209 runCMS <= 1.3a2 possible remote code execution through the integrated FCKEditor package","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/424708"},{"name":"18767","refsource":"SECUNIA","url":"http://secunia.com/advisories/18767"},{"name":"3702","refsource":"EXPLOIT-DB","url":"https://www.exploit-db.com/exploits/3702"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2006-0658","datePublished":"2006-02-13T11:00:00.000Z","dateReserved":"2006-02-13T00:00:00.000Z","dateUpdated":"2024-08-07T16:41:29.139Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2006-02-13 11:06:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fckeditor:fckeditor:2.0:*:*:*:*:*:*:*","matchCriteriaId":"8A396BB3-7329-4522-8C5F-99CCA41C9DA6"},{"vulnerable":true,"criteria":"cpe:2.3:a:fckeditor:fckeditor:2.2:*:*:*:*:*:*:*","matchCriteriaId":"D2823302-CCF1-438B-B962-6EE49D371A28"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2006","CveId":"658","Ordinal":"1","Title":"CVE-2006-0658","CVE":"CVE-2006-0658","Year":"2006"},"notes":[{"CveYear":"2006","CveId":"658","Ordinal":"1","NoteData":"Incomplete blacklist vulnerability in connector.php in FCKeditor 2.0 and 2.2, as used in products such as RunCMS, allows remote attackers to upload and execute arbitrary script files by giving the files specific extensions that are not listed in the Config[DeniedExtensions][File], such as .php.txt.","Type":"Description","Title":"CVE-2006-0658"},{"CveYear":"2006","CveId":"658","Ordinal":"2","NoteData":"2006-02-13","Type":"Other","Title":"Published"},{"CveYear":"2006","CveId":"658","Ordinal":"3","NoteData":"2017-10-09","Type":"Other","Title":"Modified"}]}}}