Impact
MetInfo CMS versions 7.9, 8.0, and 8.1 allow attackers to inject arbitrary PHP code without authentication. The vulnerability arises from insufficient input sanitization in the execution path, enabling remote code execution and potentially granting full control over the affected server.
Affected Systems
MetInfo CMS, specifically versions 7.9, 8.0, and 8.1.
Risk and Exploitability
The vulnerability carries a CVSS score of 9.3, indicating a critical impact. EPSS data is not available, and the issue is not listed in the CISA KEV catalog. The likely attack vector is an unauthenticated web request containing malicious PHP code, which can be exploited by any entity with network access to the CMS installation.
OpenCVE Enrichment