Description
baserCMS is a website development framework. Prior to version 5.2.3, there is an OS command injection vulnerability in the update functionality. Due to this issue, an authenticated user with administrator privileges in baserCMS can execute arbitrary OS commands on the server with the privileges of the user account running baserCMS. This issue has been patched in version 5.2.3.
Published: 2026-03-31
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Command Execution
Action: Patch Now
AI Analysis

Impact

An OS command injection flaw exists in the update feature of baserCMS. An authenticated administrator can trigger arbitrary operating‑system commands through the web interface, therefore obtaining full control over the host running the CMS. The attacker can execute commands with the privileges of the CMS process, enabling system compromise, data theft, or denial of service.

Affected Systems

The affected vendor is baserproject, product basercms. Versions prior to 5.2.3 are vulnerable. Version 5.2.3 and later contain the fix.

Risk and Exploitability

The vulnerability carries a CVSS score of 9.1, indicating a high severity. Exploit probability data is not available and the issue is not listed in the CISA KEV catalog. The likely attack path requires authenticated access with administrative rights; an attacker who can log in as an administrator can invoke arbitrary commands, making this a serious local privilege escalation that can lead to full system compromise.

Generated by OpenCVE AI on March 31, 2026 at 05:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade baserCMS to version 5.2.3 or later.
  • Restrict administrative accounts to trusted users and enforce least privilege.
  • Audit and monitor web logs for suspicious command execution activity.

Generated by OpenCVE AI on March 31, 2026 at 05:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-m9g7-rgfc-jcm7 baserCMS Update Functionality Vulnerable to OS Command Injection
History

Tue, 31 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
Description baserCMS is a website development framework. Prior to version 5.2.3, there is an OS command injection vulnerability in the update functionality. Due to this issue, an authenticated user with administrator privileges in baserCMS can execute arbitrary OS commands on the server with the privileges of the user account running baserCMS. This issue has been patched in version 5.2.3.
Title baserCMS: OS Command Injection in the baserCMS Update Functionality
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-31T00:45:09.718Z

Reserved: 2026-03-06T00:04:56.699Z

Link: CVE-2026-30877

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-31T01:16:35.830

Modified: 2026-03-31T01:16:35.830

Link: CVE-2026-30877

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T19:56:41Z

Weaknesses