Impact
The vulnerability originates from an eval call in VpsTest.php where the vf argument is not properly escaped, allowing an attacker to inject and execute arbitrary PHP code. This code injection enables remote code execution, a serious security flaw tracked by CWE-94 and CWE-74.
Affected Systems
Affected systems are the 546669204 vps‑inventory‑monitoring project up to commit 98c00b370668c96ae75e91c15548d9ea113652d9. The product uses a rolling release model, so newer releases may or may not contain the fix, and detailed version information is not disclosed. The vulnerability lies in the VpsTest Console command located at app/index/command/VpsTest.php.
Risk and Exploitability
The CVSS score of 5.3 denotes a moderate severity. EPSS data is not available, and the issue is not listed in the CISA KEV catalog; however, the exploit has been publicly disclosed and can be performed remotely. Until a vendor patch is released, the risk remains moderate to high if the service is exposed to untrusted input.
OpenCVE Enrichment