Home

Description

OpenCATS prior to commit 3002a29 contains a PHP code injection vulnerability in the installer AJAX endpoint that allows unauthenticated attackers to execute arbitrary code by injecting PHP statements into the databaseConnectivity action parameter. Attackers can break out of the define() string context in config.php using a single quote and statement separator to inject malicious PHP code that persists and executes on every subsequent page load when the installation wizard remains incomplete.

PUBLISHED Reserved 2026-02-23 | Published 2026-04-28 | Updated 2026-04-28 | Assigner VulnCheck




CRITICAL: 9.2CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

HIGH: 8.1CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-94 Improper Control of Generation of Code ('Code Injection')

Product status

Default status
unaffected

Any version
affected

3002a29f4c3cada1aa2c4f3d4ae4e189906606b6 (git)
unaffected

Credits

Valentin Lobstein (Chocapikk) finder

VulnCheck coordinator

References

chocapikk.com/posts/2026/opencats-installer-rce/ technical-description exploit

github.com/opencats/OpenCATS/pull/706 issue-tracking

github.com/...ommit/3002a29f4c3cada1aa2c4f3d4ae4e189906606b6 patch

github.com/...cats/OpenCATS/blob/46e4727/lib/CATSUtility.php related

github.com/...nCATS/blob/46e4727/modules/install/ajax/ui.php related

www.vulncheck.com/...e-injection-via-installer-ajax-endpoint third-party-advisory

cve.org (CVE-2026-27760)

nvd.nist.gov (CVE-2026-27760)

Download JSON