We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability was found in WuzhiCMS 4.1. It has been rated as critical. Affected by this issue is the function Set of the file /index.php?m=attachment&f=index&_su=wuzhicms&v=set&submit=1 of the component Setting Handler. The manipulation of the argument Setting leads to code injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Eine kritische Schwachstelle wurde in WuzhiCMS 4.1 ausgemacht. Hierbei geht es um die Funktion Set der Datei /index.php?m=attachment&f=index&_su=wuzhicms&v=set&submit=1 der Komponente Setting Handler. Durch die Manipulation des Arguments Setting mit unbekannten Daten kann eine code injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung.
2025-04-13: | VulDB entry created |
2025-04-14: | Advisory disclosed |
2025-04-14: | VulDB entry last update |
XingYue_Mstir (VulDB User)
vuldb.com/?id.304604 (VDB-304604 | WuzhiCMS Setting index.php set code injection)
vuldb.com/?ctiid.304604 (VDB-304604 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.549270 (Submit #549270 | wuzhicms 4.1 Code Injection)
wiki.shikangsi.com/...e/915aeba9-7d7c-4d7f-92e2-bbd5560de1a7
Support options