Skip to content
CVSS 8.1 · HIGH

CVE-2026-27760

OpenCATS prior to commit 3002a29 contains a PHP code injection vulnerability in the installer AJAX endpoint that allows unauthenticated attackers to execute arbitrary code by injecting PHP statements into the databaseConnectivity action parameter. Attackers can break out of the define() string context in config.php using a single quote and statement separator to inject malicious PHP code that persists and executes on every subsequent page load when the installation wizard remains incomplete.

Ver en NVD

Análisis

OpenCATS is an open-source Applicant Tracking System used primarily by HR departments, making it niche software for a developer-centric community. While the unauthenticated PHP code injection is high severity, the product is not part of the standard dev stack or widely deployed infrastructure.

Severidad

Puntaje: 8.1(HIGH)
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: HIGH
PR: NONE
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Tipo de falla (CWE): CWE-94

EPSS

Probabilidad de explotación (próx. 30 días): 0.0013 (0.1%)
Percentil: 31.6%
EPSS: 2026-05-06

Descripción técnica

OpenCATS prior to commit 3002a29 contains a PHP code injection vulnerability in the installer AJAX endpoint that allows unauthenticated attackers to execute arbitrary code by injecting PHP statements into the databaseConnectivity action parameter. Attackers can break out of the define() string context in config.php using a single quote and statement separator to inject malicious PHP code that persists and executes on every subsequent page load when the installation wizard remains incomplete.

Publicada: 28/4/2026, 15:16:26
Última modificación: 28/4/2026, 20:18:13

Referencias

InicioEventosBlogRecursosEquipo