Impact
Movable Type contains a code injection flaw (CWE‑94) that allows attackers to embed and run arbitrary Perl code. The vulnerability arises from insufficient validation of user‑supplied data in the blog entry processing component. Successful exploitation gives an attacker full control over the web server running the application, enabling data theft, modification, arbitrary code execution and potential lateral movement.
Affected Systems
All editions of Movable Type from Six Apart Ltd.—standard, Advanced, Premium, Premium Advanced, and the MT8‑based Premium release—are affected. No specific version numbers are enumerated; any installation lacking the latest patch may be vulnerable.
Risk and Exploitability
The flaw carries a CVSS score of 9.3, indicating a critical level of danger. An exploit probability score is not available, and the vulnerability is not listed in CISA’s KEV catalog. The attack vector can be inferred to be remote through the web interface, requiring network access to the affected instance. Attackers would gain unrestricted control without additional privileges.
OpenCVE Enrichment