CVE-2023-54339

Webgrind 1.1 contains a remote command execution vulnerability that allows unauthenticated attackers to inject OS commands via the dataFile parameter in index.php. Attackers can execute arbitrary system commands by manipulating the dataFile parameter, such as using payload '0%27%26calc.exe%26%27' to execute commands on the target system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:webgrind_project:webgrind:*:*:*:*:*:*:*:*

History

03 Feb 2026, 19:21

Type Values Removed Values Added
References () http://github.com/jokkedk/webgrind/ - () http://github.com/jokkedk/webgrind/ - Product
References () https://www.exploit-db.com/exploits/51074 - () https://www.exploit-db.com/exploits/51074 - Exploit
References () https://www.vulncheck.com/advisories/webgrind-remote-command-execution-rce-via-datafile-parameter - () https://www.vulncheck.com/advisories/webgrind-remote-command-execution-rce-via-datafile-parameter - Third Party Advisory
First Time Webgrind Project
Webgrind Project webgrind
CPE cpe:2.3:a:webgrind_project:webgrind:*:*:*:*:*:*:*:*

Information

Published : 2026-01-13 23:16

Updated : 2026-02-03 19:21


NVD link : CVE-2023-54339

Mitre link : CVE-2023-54339

CVE.ORG link : CVE-2023-54339


JSON object : View

Products Affected

webgrind_project

  • webgrind
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')