No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 28 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 28 Apr 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Opencats
Opencats opencats |
|
| Vendors & Products |
Opencats
Opencats opencats |
Tue, 28 Apr 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenCATS prior to commit 3002a29 contains a PHP code injection vulnerability in the installer AJAX endpoint that allows unauthenticated attackers to execute arbitrary code by injecting PHP statements into the databaseConnectivity action parameter. Attackers can break out of the define() string context in config.php using a single quote and statement separator to inject malicious PHP code that persists and executes on every subsequent page load when the installation wizard remains incomplete. | |
| Title | OpenCATS PHP Code Injection via installer AJAX endpoint | |
| Weaknesses | CWE-94 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-28T15:45:23.262Z
Reserved: 2026-02-23T21:38:48.842Z
Link: CVE-2026-27760
Updated: 2026-04-28T14:56:14.168Z
Status : Received
Published: 2026-04-28T15:16:26.800
Modified: 2026-04-28T15:16:26.800
Link: CVE-2026-27760
No data.
OpenCVE Enrichment
Updated: 2026-04-28T16:00:12Z