Description
A vulnerability was determined in liangliangyy DjangoBlog up to 2.1.0.0. The affected element is the function CommandHandler of the file servermanager/api/commonapi.py of the component WeChat Bot Interface. Executing a manipulation of the argument Source can lead to command injection. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-19
Score: 5.3 Medium
EPSS: n/a
KEV: No
Impact: Remote Code Execution
Action: Patch
AI Analysis

Impact

A command injection vulnerability is present in the CommandHandler function of the WeChat Bot interface within the Liangliangyy DjangoBlog project. By manipulating the Source argument, an attacker can inject arbitrary operating‑system commands that are executed by the host server. This flaw permits remote code execution, compromising the confidentiality, integrity, and availability of the affected system.

Affected Systems

All versions of Liangliangyy DjangoBlog up to and including 2.1.0.0 are affected. The flaw resides in the servermanager/api/commonapi.py module of the WeChat Bot interface, so any deployment that exposes this API is vulnerable. The vendor did not release a patch for affected versions.

Risk and Exploitability

The CVSS base score of 5.3 indicates moderate severity, while the EPSS value is not available and the vulnerability is not listed in the CISA KEV catalog. Because the flaw has been publicly disclosed and the exploit is readily available, the risk to exposed systems may be higher than the CVSS score alone suggests. Attackers can send crafted requests to the Source parameter over the network and trigger arbitrary command execution, potentially gaining full control of the server.

Generated by OpenCVE AI on April 19, 2026 at 21:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a newer release of Liangliangyy DjangoBlog that contains the command‑injection fix (avoid running 2.1.0.0 or earlier).
  • If an upgrade is not immediately possible, apply rigorous input validation on the Source parameter to only allow safe, whitelisted values before it reaches the execution routine.
  • Limit exposure of the WeChat Bot API by restricting network access to trusted IP ranges or placing a firewall/reverse proxy that blocks unauthenticated or suspicious traffic.

Generated by OpenCVE AI on April 19, 2026 at 21:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 19 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in liangliangyy DjangoBlog up to 2.1.0.0. The affected element is the function CommandHandler of the file servermanager/api/commonapi.py of the component WeChat Bot Interface. Executing a manipulation of the argument Source can lead to command injection. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Title liangliangyy DjangoBlog WeChat Bot commonapi.py CommandHandler command injection
Weaknesses CWE-74
CWE-77
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-19T19:00:16.264Z

Reserved: 2026-04-19T05:10:51.297Z

Link: CVE-2026-6576

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-19T19:16:14.347

Modified: 2026-04-19T19:16:14.347

Link: CVE-2026-6576

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-19T21:30:26Z

Weaknesses