Description
ORSEE (Online Recruitment System for Economic Experiments) 3.1.0 contains an authenticated Remote Code Execution vulnerability in the participant profile field processing subsystem. Certain field configurations accept values beginning with the prefix "func:" which are passed directly into an eval() call inside tagsets/participant.php and tagsets/options.php.
Published: 2026-05-15
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

ORSEE 3.1.0 processes participant profile fields in a way that a value beginning with the prefix "func:" is passed directly into a PHP eval() call within tagsets/participant.php and tagsets/options.php. The unchecked input leads to arbitrary PHP code execution, giving such an attacker full control over the application. This flaw corresponds to code injection vulnerabilities such as CWE-94 and can compromise confidentiality, integrity, and availability of the entire system.

Affected Systems

The vulnerability affects the Online Recruitment System for Economic Experiments (ORSEE) version 3.1.0. No other vendor or product information is listed, and the flaw is present only in that release.

Risk and Exploitability

An attacker must be authenticated to the system and able to edit the participant profile fields. The presence of eval() driven by the "func:" prefix enables any injected code to execute on the server. While no publicly available exploit is cited and the EPSS score is not available, the lack of a CISA KEV listing does not mitigate that the flaw can be fully exploited. The high severity of the flaw is consistent with the remote code execution capability and the absence of built‑in mitigating controls.

Generated by OpenCVE AI on May 15, 2026 at 20:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade ORSEE to a patched version that removes the eval() usage or replaces it with safe parsing logic.
  • If an update is unavailable, edit tagsets/participant.php and tagsets/options.php to eliminate the eval() call for "func:" inputs and enforce strict input validation.
  • Restrict access to the participant profile field configuration so that only trusted administrators can modify it, effectively denying the execution vector to unauthenticated users.

Generated by OpenCVE AI on May 15, 2026 at 20:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 15 May 2026 20:45:00 +0000

Type Values Removed Values Added
Title Authenticated Remote Code Execution via Eval in ORSEE 3.1.0
Weaknesses CWE-94

Fri, 15 May 2026 19:30:00 +0000

Type Values Removed Values Added
Description ORSEE (Online Recruitment System for Economic Experiments) 3.1.0 contains an authenticated Remote Code Execution vulnerability in the participant profile field processing subsystem. Certain field configurations accept values beginning with the prefix "func:" which are passed directly into an eval() call inside tagsets/participant.php and tagsets/options.php.
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-15T18:57:15.071Z

Reserved: 2025-12-08T00:00:00.000Z

Link: CVE-2025-67031

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-15T20:16:45.120

Modified: 2026-05-15T20:16:45.120

Link: CVE-2025-67031

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T20:30:06Z

Weaknesses