| Title | dedecms V5.7.118 Command Injection |
|---|
| Description | A vulnerability exists in DedeCMS V5.7.118 backend that allows authenticated administrators to write arbitrary PHP files to the server. The `tpl.php` file's `savetagfile` function writes user-supplied content directly to `.lib.php` files in the `include/taglib/` directory.
Although the application implements malicious code detection (Lines 31-61), this protection can be bypassed using PHP's ReflectionFunction API and php://input stream wrapper, leading to Remote Code Execution (RCE).
|
|---|
| Source | ⚠️ https://note-hxlab.wetolink.com/share/ob1uepAdQwYC |
|---|
| User | yu22x (UID 34832) |
|---|
| Submission | 12/16/2025 02:18 (4 months ago) |
|---|
| Moderation | 12/21/2025 09:23 (5 days later) |
|---|
| Status | Duplicate |
|---|
| VulDB entry | 235786 [DedeCMS up to 5.7.109 HTTP POST Request /dede/tpl.php code injection] |
|---|
| Points | 0 |
|---|