Remote Code Execution Vulnerability in SeaCMS 12.9 by Fushuling
CVE-2024-40519
8.8HIGH
Summary
The SeaCMS 12.9 version contains a remote code execution vulnerability due to improper handling of user input in the admin_smtp.php file. This occurs when user data is directly spliced and written into weixin.php without adequate validation or sanitization. As a result, authenticated attackers can exploit this flaw to execute arbitrary commands, potentially granting them unauthorized access to system resources and permissions.
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved