Textpattern CMS 4.8.8 Arbitrary File Upload Vulnerability
1、Access project address
![](https://img2023.cnblogs.com/blog/3334306/202311/3334306-20231128174104356-1714765938.png)
2、Download project files for local setup
![](https://img2023.cnblogs.com/blog/3334306/202311/3334306-20231128174206333-814791003.png)
3、Accessing the backend address for login
4、Find the file upload location
![](https://img2023.cnblogs.com/blog/3334306/202311/3334306-20231128174735116-212665998.jpg)
5、Upload malicious scripts
6、After uploading the file, save it to the fields directory, which can be accessed through the web