Remote Code Execution Vulnerability in SeaCMS 12.9 by Fushuling
CVE-2024-40520

8.8HIGH

Key Information:

Vendor
Seacms
Status
Vendor
CVE Published:
12 July 2024

Summary

SeaCMS version 12.9 presents a vulnerability that enables remote code execution due to improper handling of user input. Specifically, the admin_config_mark.php file directly splices and writes user-provided data into the inc_photowatermark_config.php file without adequate sanitization or validation. This oversight allows authenticated attackers to exploit the vulnerability, executing arbitrary commands on the server and potentially gaining unauthorized access to sensitive system permissions. It is essential for users of SeaCMS 12.9 to take prompt actions to mitigate this security risk by applying necessary patches or implementing appropriate security controls.

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2024-40520 : Remote Code Execution Vulnerability in SeaCMS 12.9 by Fushuling | SecurityVulnerability.io