CuppaCMS 1.0 is vulnerable to Remote Code Execution (RCE). An authenticated user can control both parameters (action and function) from "/api/index.php.
References
Link | Resource |
---|---|
https://github.com/CuppaCMS/CuppaCMS/issues/22 | Exploit Issue Tracking Third Party Advisory |
https://github.com/badru8612/Authenticated-RCE-CuppaCMS | Exploit Issue Tracking Third Party Advisory |
Configurations
History
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-Other |
17 Sep 2022, 01:52
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-732 | |
CPE | cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:* | |
References | (MISC) https://github.com/CuppaCMS/CuppaCMS/issues/22 - Exploit, Issue Tracking, Third Party Advisory | |
References | (MISC) https://github.com/badru8612/Authenticated-RCE-CuppaCMS - Exploit, Issue Tracking, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
13 Sep 2022, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-09-13 23:15
Updated : 2024-02-04 22:51
NVD link : CVE-2022-37190
Mitre link : CVE-2022-37190
CVE.ORG link : CVE-2022-37190
JSON object : View
Products Affected
cuppacms
- cuppacms
CWE