We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability was found in wuzhicms 4.1.0. It has been classified as critical. Affected is the function add/edit of the file www/coreframe/app/content/admin/block.php. The manipulation leads to code injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Initially two separate issues were created by the researcher for the different function calls. The vendor was contacted early about this disclosure but did not respond in any way.
Es wurde eine kritische Schwachstelle in wuzhicms 4.1.0 ausgemacht. Betroffen hiervon ist die Funktion add/edit der Datei www/coreframe/app/content/admin/block.php. Durch Manipulieren mit unbekannten Daten kann eine code injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung.
2024-10-29: | Advisory disclosed |
2024-10-29: | VulDB entry created |
2024-10-29: | VulDB entry last update |
LVZC (VulDB User)
vuldb.com/?id.282444 (VDB-282444 | wuzhicms block.php edit code injection)
vuldb.com/?ctiid.282444 (VDB-282444 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.427401 (Submit #427401 | Beijing Wuzhi Internet Technology Co., Ltd wuzhicms 4.1.0 Remote Command Execution)
github.com/wuzhicms/wuzhicms/issues/209
Support options