Impact
The flaw is an OS command injection in the baserCMS installer before version 5.2.3. An attacker who can reach the installer page can supply crafted input that will be passed directly to the operating system shell, allowing the execution of arbitrary commands. This leads to full compromise of the hosting machine, including confidentiality, integrity, and availability. The weakness corresponds to CWE‑78 and is rated CVSS 9.2.
Affected Systems
The affected product is baserCMS, a web application framework produced by the baserproject team. Versions earlier than 5.2.3 are vulnerable; the patch was released in the 5.2.3 release.
Risk and Exploitability
The CVSS score of 9.2 indicates a high‑severity risk, but the EPSS score of less than 1% suggests low current exploitation activity. The vulnerability is not listed in the CISA KEV catalog. Potential attackers would target the publicly accessible installer endpoint; the attack vector is remote via the web interface, and it requires that the installer still be operational. If it remains exposed, exploitation can occur without authentication.
OpenCVE Enrichment
Github GHSA