Impact
A weakness resides in EyouCMS versions up to 1.7.9 within the FilemanagerLogic.php component's editFile function. The flaw permits arbitrary code injection by manipulating input parameters, thereby enabling an attacker to execute code on the server. The vulnerability is classified as a code injection issue (CWE-94) with potential for command injection or arbitrary code execution. If exploited, the attacker could compromise the confidentiality, integrity, and availability of the application and underlying system.
Affected Systems
Products affected are EyouCMS, an open‑source web content management system. All releases up to version 1.7.9 are vulnerable due to a flaw in the Template File Handler's editFile feature. No other vendors or products are listed in the CVE data.
Risk and Exploitability
CVSS score of 5.1 indicates a moderate severity risk. EPSS score is not available, and the vulnerability is not listed in CISA’s KEV catalog, suggesting limited confirmed exploitation in the wild. Attackers can trigger the flaw remotely via the web interface, and the exploit code has already been released publicly. Thus the risk remains present until a fix is applied. The likely attack vector is through remote access to the file‑management endpoint, as no authentication constraints are detailed in the description.
OpenCVE Enrichment