In Gila CMS 1.16.0, an attacker can upload a shell to tmp directy and abuse .htaccess through the logs function for executing PHP files.
No PoCs from references.
- https://github.com/ARPSyndicate/cvemon
- https://github.com/jkana/Gila-CMS-1.16.0-shell-upload