CVE-2011-10013
Severity CVSS v4.0:
CRITICAL
Type:
CWE-94
Code Injection
Publication date:
13/08/2025
Last modified:
14/08/2025
Description
Traq versions 2.0 through 2.3 contain a remote code execution vulnerability in the admincp/common.php script. The flawed authorization logic fails to halt execution after a failed access check, allowing unauthenticated users to reach admin-only functionality. This can be exploited via plugins.php to inject and execute arbitrary PHP code.
Impact
Base Score 4.0
10.00
Severity 4.0
CRITICAL
References to Advisories, Solutions, and Tools
- https://github.com/nirix/traq/releases/tag/v2.3.1
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/traq_plugin_exec.rb
- https://web.archive.org/web/20110729003039/https://traqproject.org/
- https://www.exploit-db.com/exploits/18213
- https://www.exploit-db.com/exploits/18239
- https://www.vulncheck.com/advisories/traq-issue-tracking-system-rce



