CVE-2019-25687

Pegasus CMS 1.0 contains a remote code execution vulnerability in the extra_fields.php plugin that allows unauthenticated attackers to execute arbitrary commands by exploiting unsafe eval functionality. Attackers can send POST requests to the submit.php endpoint with malicious PHP code in the action parameter to achieve code execution and obtain an interactive shell.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wisdom:pegasus_cms:1.0:*:*:*:*:*:*:*

History

24 Apr 2026, 15:42

Type Values Removed Values Added
CPE cpe:2.3:a:wisdom:pegasus_cms:1.0:*:*:*:*:*:*:*
References () https://www.exploit-db.com/exploits/46542 - () https://www.exploit-db.com/exploits/46542 - Exploit, VDB Entry
References () https://www.vulncheck.com/advisories/pegasus-cms-remote-code-execution-via-extra-fields-php - () https://www.vulncheck.com/advisories/pegasus-cms-remote-code-execution-via-extra-fields-php - Third Party Advisory
References () https://www.wisdom.com.au/web/pegasus-cms - () https://www.wisdom.com.au/web/pegasus-cms - Product
First Time Wisdom
Wisdom pegasus Cms

05 Apr 2026, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-05 21:16

Updated : 2026-04-24 15:42


NVD link : CVE-2019-25687

Mitre link : CVE-2019-25687

CVE.ORG link : CVE-2019-25687


JSON object : View

Products Affected

wisdom

  • pegasus_cms
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')