CVE-2013-10051
Severity CVSS v4.0:
CRITICAL
Type:
Unavailable / Other
Publication date:
01/08/2025
Last modified:
09/10/2025
Description
A remote PHP code execution vulnerability exists in InstantCMS version 1.6 and earlier due to unsafe use of eval() within the search view handler. Specifically, user-supplied input passed via the look parameter is concatenated into a PHP expression and executed without proper sanitation. A remote attacker can exploit this flaw by sending a crafted HTTP GET request with a base64-encoded payload in the Cmd header, resulting in arbitrary PHP code execution within the context of the web server.
Impact
Base Score 4.0
9.30
Severity 4.0
CRITICAL
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:instantcms:instantcms:*:*:*:*:*:*:*:* | 1.6.0 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://packetstorm.news/files/id/122176
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/instantcms_exec.rb
- https://www.exploit-db.com/exploits/26622
- https://www.vulncheck.com/advisories/instantcms-remote-php-code-execution
- https://www.exploit-db.com/exploits/26622



