CVE-2009-20010
Severity CVSS v4.0:
CRITICAL
Type:
CWE-78
OS Command Injections
Publication date:
30/08/2025
Last modified:
02/09/2025
Description
Dogfood CRM version 2.0.10 contains a remote command execution vulnerability in the spell.php script used by its mail subsystem. The vulnerability arises from unsanitized user input passed via a POST request to the data parameter, which is processed by the underlying shell without adequate escaping. This allows attackers to inject arbitrary shell commands and execute them on the server. The flaw is exploitable without authentication and was discovered by researcher LSO.
Impact
Base Score 4.0
9.30
Severity 4.0
CRITICAL
References to Advisories, Solutions, and Tools
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/dogfood_spell_exec.rb
- https://sourceforge.net/projects/dogfood/files/
- https://www.exploit-db.com/exploits/16917
- https://www.fortiguard.com/encyclopedia/ips/28547/dogfood-crm-spell-remote-command-execution
- https://www.vulncheck.com/advisories/dogfood-crm-rce



