PopojiCMS 2.0.1 contains an authenticated remote command execution vulnerability that allows administrative users to inject malicious PHP code through the metadata settings endpoint. Attackers can log in and modify the meta content to create a web shell that executes arbitrary system commands through a GET parameter.
References
| Link | Resource |
|---|---|
| https://github.com/PopojiCMS/PopojiCMS | Product |
| https://github.com/PopojiCMS/PopojiCMS/archive/refs/tags/v2.0.1.zip | Release Notes |
| https://www.exploit-db.com/exploits/52022 | Exploit Third Party Advisory |
| https://www.popojicms.org/ | Product |
| https://www.vulncheck.com/advisories/popojicms-remote-command-execution-via-authenticated-metadata-settings | Third Party Advisory |
| https://github.com/PopojiCMS/PopojiCMS/archive/refs/tags/v2.0.1.zip | Release Notes |
Configurations
History
No history.
Information
Published : 2025-12-10 22:16
Updated : 2025-12-19 17:42
NVD link : CVE-2024-58284
Mitre link : CVE-2024-58284
CVE.ORG link : CVE-2024-58284
JSON object : View
Products Affected
popojicms
- popojicms
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
