Home

Description

EN DE

A vulnerability was found in mirweiye wenkucms up to 3.4. This impacts the function createPathOne of the file app/common/common.php. The manipulation results in os command injection. The attack may be launched remotely. The exploit has been made public and could be used.

In mirweiye wenkucms up to 3.4 ist eine Schwachstelle entdeckt worden. Das betrifft die Funktion createPathOne der Datei app/common/common.php. Dank Manipulation mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung.

PUBLISHED Reserved 2025-09-28 | Published 2025-09-29 | Updated 2025-09-29 | Assigner VulDB




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 6.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
MEDIUM: 6.3CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
6.5AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR

Problem types

OS Command Injection

Command Injection

Product status

3.0
affected

3.1
affected

3.2
affected

3.3
affected

3.4
affected

Timeline

2025-09-28:Advisory disclosed
2025-09-28:VulDB entry created
2025-09-28:VulDB entry last update

Credits

electroN1c (VulDB User) reporter

References

vuldb.com/?id.326215 (VDB-326215 | mirweiye wenkucms common.php createPathOne os command injection) vdb-entry technical-description

vuldb.com/?ctiid.326215 (VDB-326215 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.657055 (Submit #657055 | Beijing Seven Bears Technology Co., Ltd. wenkucms V3.4 OS Command Injection) third-party-advisory

github.com/electroN1chahaha/wenkucms-RCE/issues/1 exploit issue-tracking

cve.org (CVE-2025-11138)

nvd.nist.gov (CVE-2025-11138)

Download JSON