Description
A security vulnerability has been detected in Sanluan PublicCMS up to 6.202506.d. This affects the function AbstractFreemarkerView.doRender of the file publiccms-parent/publiccms-core/src/main/java/com/publiccms/common/base/AbstractFreemarkerView.java of the component FreeMarker Template Handler. Such manipulation leads to improper neutralization of special elements used in a template engine. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-04-09
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Apply Patch
AI Analysis

Impact

A flaw in the FreeMarker Template Handler of Sanluan PublicCMS allows an attacker to supply malicious template content that is processed without proper neutralization of special elements. This template injection can lead to execution of arbitrary code on the host machine running the CMS, compromising confidentiality, integrity, and availability of the underlying system.

Affected Systems

Sanluan PublicCMS versions up to and including 6.202506.d. The vulnerability resides in the AbstractFreemarkerView.java class, specifically the doRender method within the publiccms-core module.

Risk and Exploitability

The CVSS score of 5.1 indicates medium severity. EPSS data are not available and the vulnerability is not listed in the CISA KEV catalog, suggesting that widespread exploitation may not yet be observed. Nevertheless, the issue is exploitable remotely and requires an attacker to influence template data, likely through a web interface that processes user‑controlled templates. The lack of a vendor‑issued patch at present increases the risk for systems still running affected versions.

Generated by OpenCVE AI on April 10, 2026 at 00:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update PublicCMS to a version newer than 6.202506.d if an official patch is available.
  • If no patch is available, disable the FreeMarker template engine or lock it to trusted templates only.
  • Sanitize or validate all user‑supplied template input to remove special elements.
  • Monitor application logs for abnormal template processing or unexpected code execution.

Generated by OpenCVE AI on April 10, 2026 at 00:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Sanluan
Sanluan publiccms
Vendors & Products Sanluan
Sanluan publiccms

Thu, 09 Apr 2026 23:15:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in Sanluan PublicCMS up to 6.202506.d. This affects the function AbstractFreemarkerView.doRender of the file publiccms-parent/publiccms-core/src/main/java/com/publiccms/common/base/AbstractFreemarkerView.java of the component FreeMarker Template Handler. Such manipulation leads to improper neutralization of special elements used in a template engine. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Title Sanluan PublicCMS FreeMarker Template AbstractFreemarkerView.java AbstractFreemarkerView.doRender special elements used in a template engine
First Time appeared Publiccms
Publiccms publiccms
Weaknesses CWE-1336
CWE-791
CPEs cpe:2.3:a:publiccms:publiccms:*:*:*:*:*:*:*:*
Vendors & Products Publiccms
Publiccms publiccms
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Publiccms Publiccms
Sanluan Publiccms
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-10T13:52:31.589Z

Reserved: 2026-04-09T12:27:35.189Z

Link: CVE-2026-5987

cve-icon Vulnrichment

Updated: 2026-04-10T13:52:28.481Z

cve-icon NVD

Status : Deferred

Published: 2026-04-09T23:17:02.133

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-5987

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:27:33Z

Weaknesses