Pegasus CMS 1.0 contains a remote code execution vulnerability in the extra_fields.php plugin that allows unauthenticated attackers to execute arbitrary commands by exploiting unsafe eval functionality. Attackers can send POST requests to the submit.php endpoint with malicious PHP code in the action parameter to achieve code execution and obtain an interactive shell.
Metrics
Affected Vendors & Products
References
History
Sun, 05 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Pegasus CMS 1.0 contains a remote code execution vulnerability in the extra_fields.php plugin that allows unauthenticated attackers to execute arbitrary commands by exploiting unsafe eval functionality. Attackers can send POST requests to the submit.php endpoint with malicious PHP code in the action parameter to achieve code execution and obtain an interactive shell. | |
| Title | Pegasus CMS 1.0 Remote Code Execution via extra_fields.php | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-04-05T20:45:36.223Z
Updated: 2026-04-06T18:21:04.155Z
Reserved: 2026-04-05T15:27:56.011Z
Link: CVE-2019-25687
No data.
Status : Received
Published: 2026-04-05T21:16:47.490
Modified: 2026-04-05T21:16:47.490
Link: CVE-2019-25687
No data.
ReportizFlow