Submit #778873: code-projects Chamber of Commerce Membership Management System 1.0 Command Injectioninfo

Titelcode-projects Chamber of Commerce Membership Management System 1.0 Command Injection
BeschreibungA critical Remote Code Execution (RCE) vulnerability has been identified in CMMS (Chamber of Commerce Membership Management Software). This vulnerability resides in the mail queue functionality within the admin/pageMail.php and admin/pageSender.php files. When an administrator sends an email, the application writes the user-supplied mail subject and message body directly into a dynamically generated PHP file using fwrite(), which is subsequently included and executed by pageSender.php via include(). Due to insufficient input sanitization of the $mailSubject and $mailMessage parameters before writing them into the PHP file, an attacker with administrator privileges can inject arbitrary PHP code through the mail message field. Successful exploitation allows the attacker to execute arbitrary system commands, read or modify any file on the server, and completely compromise the underlying system. Although this vulnerability requires administrator-level authentication, it poses a significant security risk in scenarios involving compromised admin credentials, insider threats, or CSRF chaining (as the mail form lacks CSRF protection). Immediate remediation is recommended by replacing the PHP file-based mail queue mechanism with a non-executable data format such as JSON or a database-backed queue.
Quelle⚠️ https://gist.github.com/y7y7y77/dd6df2db50fd0146b72fc4e0766a4ffd
Benutzer y7_0x (UID 96237)
Einreichung12.03.2026 19:03 (vor 17 Tagen)
Moderieren27.03.2026 17:27 (15 days later)
StatusAkzeptiert
VulDB Eintrag353964 [code-projects Chamber of Commerce Membership Management System 1.0 admin/pageMail.php fwrite mailSubject/mailMessage erweiterte Rechte]
Punkte20

Want to know what is going to be exploited?

We predict KEV entries!