Webgrind 1.1 contains a remote command execution vulnerability that allows unauthenticated attackers to inject OS commands via the dataFile parameter in index.php. Attackers can execute arbitrary system commands by manipulating the dataFile parameter, such as using payload '0%27%26calc.exe%26%27' to execute commands on the target system.
References
| Link | Resource |
|---|---|
| http://github.com/jokkedk/webgrind/ | Product |
| https://www.exploit-db.com/exploits/51074 | Exploit |
| https://www.vulncheck.com/advisories/webgrind-remote-command-execution-rce-via-datafile-parameter | Third Party Advisory |
| https://www.exploit-db.com/exploits/51074 | Exploit |
Configurations
History
03 Feb 2026, 19:21
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://github.com/jokkedk/webgrind/ - Product | |
| References | () https://www.exploit-db.com/exploits/51074 - Exploit | |
| References | () https://www.vulncheck.com/advisories/webgrind-remote-command-execution-rce-via-datafile-parameter - Third Party Advisory | |
| First Time |
Webgrind Project
Webgrind Project webgrind |
|
| CPE | cpe:2.3:a:webgrind_project:webgrind:*:*:*:*:*:*:*:* |
Information
Published : 2026-01-13 23:16
Updated : 2026-02-03 19:21
NVD link : CVE-2023-54339
Mitre link : CVE-2023-54339
CVE.ORG link : CVE-2023-54339
JSON object : View
Products Affected
webgrind_project
- webgrind
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
