CVE-2026-29014 Scanner

CVE-2026-29014 Scanner - Remote Code Execution (RCE) vulnerability in MetInfo CMS

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

11 days 19 hours

Scan only one

Domain, Subdomain, IPv4

Toolbox

MetInfo CMS is a widely utilized content management system known for its simplicity and effectiveness in building and managing websites. It is popular among small to medium-sized businesses and web development agencies for deploying multilingual and feature-rich websites. The CMS allows ease of use and flexibility for non-technical users while providing developers options to extend its functionalities. With its numerous plugins and configurability, MetInfo CMS caters to a broad range of web design and deployment needs. However, like any robust CMS, it is also a target for security vulnerabilities, particularly when updates are not regularly applied. Ensuring up-to-date software versions is crucial in maintaining secure web environments.

Remote Code Execution (RCE) vulnerabilities are significant security concerns where attackers can remotely execute arbitrary code on a vulnerable application. This specific flaw in MetInfo CMS arises from insufficient input neutralization, making it possible for malicious actors to inject and run unauthorized PHP code. It poses a high risk because exploited systems can be entirely controlled by attackers without any authentication. This vulnerability type severely compromises the security integrity of the application and demands immediate attention and remediation. Without proper measures, an RCE can lead to substantial business disruptions and data breaches.

The vulnerability is triggered through a PHP code injection flaw in the execution path, specifically within requests sent to the application. The primary endpoint affected is '/app/system/entrance.php', configured to handle XML content for certain operations. The flaw involves crafting requests with specific payloads that manipulate the application's input processing. Attackers leverage eval' and base64_decode' functions by passing suitably encoded parameters to execute remote commands. Detection requires inspecting responses for specific success indicators within HTML and evaluating the response status.

Exploiting this vulnerability allows attackers to gain full control over an affected server, thereby compromising sensitive data and potentially rendering the site defunct. A compromised system can lead to confidential information theft, website defacement, and distribution of malware to visitors. The ripple effect might damage the reputation of businesses, lead to financial losses, and incur litigation or regulatory fines. An RCE vulnerability like this can also serve as a gateway for further nested attacks into internal networks. Immediate patching and proactive security monitoring are paramount in protecting against such threats.

REFERENCES

Get started to protecting your digital assets