CVE-2010-20120
Severity CVSS v4.0:
HIGH
Type:
CWE-94
Code Injection
Publication date:
21/08/2025
Last modified:
22/08/2025
Description
Maple versions up to and including 13's Maplet framework allows embedded commands to be executed automatically when a .maplet file is opened. This behavior bypasses standard security restrictions that normally prevent code execution in regular Maple worksheets. The vulnerability enables attackers to craft malicious .maplet files that execute arbitrary code without user interaction.
Impact
Base Score 4.0
8.40
Severity 4.0
HIGH
References to Advisories, Solutions, and Tools
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/fileformat/maple_maplet.rb
- https://www.exploit-db.com/exploits/16308
- https://www.juniper.net/us/en/threatlabs/ips-signatures/detail.HTTP:MISC:MAPLE-MAPLET-CMD-EXEC.html
- https://www.maplesoft.com/products/maple/
- https://www.vulncheck.com/advisories/maple-maplet-file-creation-command-execution
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/fileformat/maple_maplet.rb
- https://www.exploit-db.com/exploits/16308



