← Retour aux CVEs
CVE-2023-54339
CRITICAL9.8
Description
Webgrind 1.1 contains a remote command execution vulnerability that allows unauthenticated attackers to inject OS commands via the dataFile parameter in index.php. Attackers can execute arbitrary system commands by manipulating the dataFile parameter, such as using payload '0%27%26calc.exe%26%27' to execute commands on the target system.
Details CVE
Score CVSS v3.19.8
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie1/13/2026
Derniere modification2/3/2026
Sourcenvd
Observations honeypot0
Produits affectes
webgrind_project:webgrind
Faiblesses (CWE)
CWE-78
References
http://github.com/jokkedk/webgrind/(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/51074(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/webgrind-remote-command-execution-rce-via-datafile-parameter(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/51074(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.