In maccms v10, an attacker can log in through /index.php/user/login in the "col" and "openid" parameters to gain privileges.
An arbitrary file upload vulnerability in the Template Upload function of Maccms10 allows attackers bypass the suffix whitelist verification to execute arbitrary code via adding a character to the end of the uploaded file's name.