Description
A weakness has been identified in EyouCMS up to 1.7.9. Impacted is the function editFile of the file application/admin/logic/FilemanagerLogic.php of the component Template File Handler. Executing a manipulation can lead to code injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-04-29
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A weakness resides in EyouCMS versions up to 1.7.9 within the FilemanagerLogic.php component's editFile function. The flaw permits arbitrary code injection by manipulating input parameters, thereby enabling an attacker to execute code on the server. The vulnerability is classified as a code injection issue (CWE-94) with potential for command injection or arbitrary code execution. If exploited, the attacker could compromise the confidentiality, integrity, and availability of the application and underlying system.

Affected Systems

Products affected are EyouCMS, an open‑source web content management system. All releases up to version 1.7.9 are vulnerable due to a flaw in the Template File Handler's editFile feature. No other vendors or products are listed in the CVE data.

Risk and Exploitability

CVSS score of 5.1 indicates a moderate severity risk. EPSS score is not available, and the vulnerability is not listed in CISA’s KEV catalog, suggesting limited confirmed exploitation in the wild. Attackers can trigger the flaw remotely via the web interface, and the exploit code has already been released publicly. Thus the risk remains present until a fix is applied. The likely attack vector is through remote access to the file‑management endpoint, as no authentication constraints are detailed in the description.

Generated by OpenCVE AI on April 29, 2026 at 16:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a fixed EyouCMS release beyond version 1.7.9 that resolves the code injection flaw.
  • Restrict file‑manager access to trusted administrative accounts and enforce strict authentication.
  • Sanitize all input parameters used by the editFile function to eliminate the ability to execute code, following injection‑prevention best practices.
  • Deploy a Web Application Firewall rule set to block suspicious requests targeting the editFile endpoint.

Generated by OpenCVE AI on April 29, 2026 at 16:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 29 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in EyouCMS up to 1.7.9. Impacted is the function editFile of the file application/admin/logic/FilemanagerLogic.php of the component Template File Handler. Executing a manipulation can lead to code injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
Title EyouCMS Template File FilemanagerLogic.php editFile code injection
First Time appeared Eyoucms
Eyoucms eyoucms
Weaknesses CWE-74
CWE-94
CPEs cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*
Vendors & Products Eyoucms
Eyoucms eyoucms
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-29T18:32:10.189Z

Reserved: 2026-04-29T09:34:57.835Z

Link: CVE-2026-7388

cve-icon Vulnrichment

Updated: 2026-04-29T18:01:02.964Z

cve-icon NVD

Status : Deferred

Published: 2026-04-29T16:16:29.517

Modified: 2026-04-29T21:16:21.590

Link: CVE-2026-7388

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T17:00:13Z

Weaknesses