CuppaCMS 1.0 is vulnerable to Remote Code Execution (RCE). An authenticated user can control both parameters (action and function) from "/api/index.php.
References
Link | Resource |
---|---|
https://github.com/CuppaCMS/CuppaCMS/issues/22 | Exploit Issue Tracking Third Party Advisory |
https://github.com/badru8612/Authenticated-RCE-CuppaCMS | Exploit Issue Tracking Third Party Advisory |
https://github.com/CuppaCMS/CuppaCMS/issues/22 | Exploit Issue Tracking Third Party Advisory |
https://github.com/badru8612/Authenticated-RCE-CuppaCMS | Exploit Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 07:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/CuppaCMS/CuppaCMS/issues/22 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://github.com/badru8612/Authenticated-RCE-CuppaCMS - Exploit, Issue Tracking, Third Party Advisory |
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-Other |
Information
Published : 2022-09-13 23:15
Updated : 2024-11-21 07:14
NVD link : CVE-2022-37190
Mitre link : CVE-2022-37190
CVE.ORG link : CVE-2022-37190
JSON object : View
Products Affected
cuppacms
- cuppacms
CWE