Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
No reference.
Fri, 16 Jan 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-862 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Fri, 16 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Bitrix24 - Remote Code Execution (RCE) (Authenticated) | |
| Metrics |
ssvc
|
Fri, 16 Jan 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Bitrix24 contains an authenticated remote code execution vulnerability that allows logged-in attackers to execute arbitrary system commands through the PHP command line admin interface. Attackers can leverage the vulnerability by sending crafted POST requests to the administrative endpoint with system commands to execute code with the web application's privileges. | This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. |
| Metrics |
cvssV4_0
|
cvssV4_0
|
Wed, 14 Jan 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 14 Jan 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bitrix24
Bitrix24 bitrix24 |
|
| Vendors & Products |
Bitrix24
Bitrix24 bitrix24 |
Tue, 13 Jan 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Bitrix24 contains an authenticated remote code execution vulnerability that allows logged-in attackers to execute arbitrary system commands through the PHP command line admin interface. Attackers can leverage the vulnerability by sending crafted POST requests to the administrative endpoint with system commands to execute code with the web application's privileges. | |
| Title | Bitrix24 - Remote Code Execution (RCE) (Authenticated) | |
| Weaknesses | CWE-862 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: REJECTED
Assigner: VulnCheck
Published:
Updated: 2026-01-16T14:31:21.289Z
Reserved: 2026-01-11T13:14:18.876Z
Link: CVE-2022-50911
Updated:
Status : Rejected
Published: 2026-01-13T23:15:54.173
Modified: 2026-01-16T15:15:50.440
Link: CVE-2022-50911
No data.
OpenCVE Enrichment
Updated: 2026-01-14T10:49:27Z
No weakness.