Home

Description

Pegasus CMS 1.0 contains a remote code execution vulnerability in the extra_fields.php plugin that allows unauthenticated attackers to execute arbitrary commands by exploiting unsafe eval functionality. Attackers can send POST requests to the submit.php endpoint with malicious PHP code in the action parameter to achieve code execution and obtain an interactive shell.

PUBLISHED Reserved 2026-04-05 | Published 2026-04-05 | Updated 2026-04-06 | Assigner VulnCheck




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

1.0
affected

Credits

R3zk0n finder

References

www.exploit-db.com/exploits/46542 (ExploitDB-46542) exploit

www.wisdom.com.au/web/pegasus-cms (Official Product Homepage) product

www.vulncheck.com/...ote-code-execution-via-extra-fields-php (VulnCheck Advisory: Pegasus CMS 1.0 Remote Code Execution via extra_fields.php) third-party-advisory

cve.org (CVE-2019-25687)

nvd.nist.gov (CVE-2019-25687)

Download JSON