EUVD-2026-17255

| CVE-2026-21861 CRITICAL
2026-03-31 GitHub_M GHSA-qxmc-6f24-g86g
9.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Patch Released
Apr 01, 2026 - 02:30 nvd
Patch available
Analysis Generated
Mar 31, 2026 - 01:00 vuln.today
EUVD ID Assigned
Mar 31, 2026 - 01:00 euvd
EUVD-2026-17255
CVE Published
Mar 31, 2026 - 00:43 nvd
CRITICAL 9.1

Description

baserCMS is a website development framework. Prior to version 5.2.3, baserCMS contains an OS command injection vulnerability in the core update functionality. An authenticated administrator can execute arbitrary OS commands on the server due to improper handling of user-controlled input that is directly passed to exec() without sufficient validation or escaping. This issue has been patched in version 5.2.3.

Analysis

OS command injection in baserCMS core update functionality allows authenticated administrators to execute arbitrary system commands on the server. The vulnerability affects baserCMS versions prior to 5.2.3, stemming from improper sanitization of user-controlled input passed directly to exec() functions. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Inventory all baserCMS installations and document current versions; isolate any instances running versions prior to 5.2.3 from production traffic if possible. Within 7 days: Contact baserCMS vendor for patch availability timeline and interim guidance; implement enhanced monitoring of administrator account activity and command execution logs on affected systems. …

Sign in for detailed remediation steps.

Priority Score

46
Low Medium High Critical
KEV: 0
EPSS: +0.2
CVSS: +46
POC: 0

Share

EUVD-2026-17255 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy