Search criteria
2 vulnerabilities found for content_management_system by defaultfuction
CVE-2026-5333 (GCVE-0-2026-5333)
Vulnerability from nvd – Published: 2026-04-02 13:30 – Updated: 2026-04-02 13:54
VLAI?
Title
DefaultFuction Content-Management-System tools.php command injection
Summary
A security flaw has been discovered in DefaultFuction Content-Management-System 1.0. This issue affects some unknown processing of the file /admin/tools.php. The manipulation of the argument host results in command injection. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks.
Severity ?
Assigner
References
6 references
| URL | Tags |
|---|---|
| https://vuldb.com/vuln/354667 | vdb-entrytechnical-description |
| https://vuldb.com/vuln/354667/cti | signaturepermissions-required |
| https://vuldb.com/submit/780849 | third-party-advisory |
| https://github.com/DefaultFuction/Content-Managem… | issue-tracking |
| https://github.com/DefaultFuction/Content-Managem… | exploitissue-tracking |
| https://github.com/DefaultFuction/Content-Managem… | product |
Impacted products
1 product
| Vendor | Product | Version | |
|---|---|---|---|
| DefaultFuction | Content-Management-System |
Affected:
1.0
|
Credits
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-5333",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-04-02T13:54:00.449255Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-04-02T13:54:13.691Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Content-Management-System",
"vendor": "DefaultFuction",
"versions": [
{
"status": "affected",
"version": "1.0"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Practice (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A security flaw has been discovered in DefaultFuction Content-Management-System 1.0. This issue affects some unknown processing of the file /admin/tools.php. The manipulation of the argument host results in command injection. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 7.5,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-77",
"description": "Command Injection",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-74",
"description": "Injection",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-02T13:30:14.585Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-354667 | DefaultFuction Content-Management-System tools.php command injection",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/vuln/354667"
},
{
"name": "VDB-354667 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/vuln/354667/cti"
},
{
"name": "Submit #780849 | DefaultFuction CMS V1.0.0 Command Injection",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/submit/780849"
},
{
"tags": [
"issue-tracking"
],
"url": "https://github.com/DefaultFuction/Content-Management-System/issues/1"
},
{
"tags": [
"exploit",
"issue-tracking"
],
"url": "https://github.com/DefaultFuction/Content-Management-System/issues/1#issue-4082558620"
},
{
"tags": [
"product"
],
"url": "https://github.com/DefaultFuction/Content-Management-System/"
}
],
"timeline": [
{
"lang": "en",
"time": "2026-04-01T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2026-04-01T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2026-04-01T16:07:03.000Z",
"value": "VulDB entry last update"
}
],
"title": "DefaultFuction Content-Management-System tools.php command injection"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2026-5333",
"datePublished": "2026-04-02T13:30:14.585Z",
"dateReserved": "2026-04-01T14:01:58.729Z",
"dateUpdated": "2026-04-02T13:54:13.691Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-5333 (GCVE-0-2026-5333)
Vulnerability from cvelistv5 – Published: 2026-04-02 13:30 – Updated: 2026-04-02 13:54
VLAI?
Title
DefaultFuction Content-Management-System tools.php command injection
Summary
A security flaw has been discovered in DefaultFuction Content-Management-System 1.0. This issue affects some unknown processing of the file /admin/tools.php. The manipulation of the argument host results in command injection. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks.
Severity ?
Assigner
References
6 references
| URL | Tags |
|---|---|
| https://vuldb.com/vuln/354667 | vdb-entrytechnical-description |
| https://vuldb.com/vuln/354667/cti | signaturepermissions-required |
| https://vuldb.com/submit/780849 | third-party-advisory |
| https://github.com/DefaultFuction/Content-Managem… | issue-tracking |
| https://github.com/DefaultFuction/Content-Managem… | exploitissue-tracking |
| https://github.com/DefaultFuction/Content-Managem… | product |
Impacted products
1 product
| Vendor | Product | Version | |
|---|---|---|---|
| DefaultFuction | Content-Management-System |
Affected:
1.0
|
Credits
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-5333",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-04-02T13:54:00.449255Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-04-02T13:54:13.691Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Content-Management-System",
"vendor": "DefaultFuction",
"versions": [
{
"status": "affected",
"version": "1.0"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Practice (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A security flaw has been discovered in DefaultFuction Content-Management-System 1.0. This issue affects some unknown processing of the file /admin/tools.php. The manipulation of the argument host results in command injection. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 7.5,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-77",
"description": "Command Injection",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-74",
"description": "Injection",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-02T13:30:14.585Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-354667 | DefaultFuction Content-Management-System tools.php command injection",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/vuln/354667"
},
{
"name": "VDB-354667 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/vuln/354667/cti"
},
{
"name": "Submit #780849 | DefaultFuction CMS V1.0.0 Command Injection",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/submit/780849"
},
{
"tags": [
"issue-tracking"
],
"url": "https://github.com/DefaultFuction/Content-Management-System/issues/1"
},
{
"tags": [
"exploit",
"issue-tracking"
],
"url": "https://github.com/DefaultFuction/Content-Management-System/issues/1#issue-4082558620"
},
{
"tags": [
"product"
],
"url": "https://github.com/DefaultFuction/Content-Management-System/"
}
],
"timeline": [
{
"lang": "en",
"time": "2026-04-01T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2026-04-01T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2026-04-01T16:07:03.000Z",
"value": "VulDB entry last update"
}
],
"title": "DefaultFuction Content-Management-System tools.php command injection"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2026-5333",
"datePublished": "2026-04-02T13:30:14.585Z",
"dateReserved": "2026-04-01T14:01:58.729Z",
"dateUpdated": "2026-04-02T13:54:13.691Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}