Pegasus CMS 1.0 contains a remote code execution vulnerability in the extra_fields.php plugin that allows unauthenticated attackers to execute arbitrary commands by exploiting unsafe eval functionality. Attackers can send POST requests to the submit.php endpoint with malicious PHP code in the action parameter to achieve code execution and obtain an interactive shell.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/46542 | Exploit VDB Entry |
| https://www.vulncheck.com/advisories/pegasus-cms-remote-code-execution-via-extra-fields-php | Third Party Advisory |
| https://www.wisdom.com.au/web/pegasus-cms | Product |
Configurations
History
24 Apr 2026, 15:42
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:wisdom:pegasus_cms:1.0:*:*:*:*:*:*:* | |
| References | () https://www.exploit-db.com/exploits/46542 - Exploit, VDB Entry | |
| References | () https://www.vulncheck.com/advisories/pegasus-cms-remote-code-execution-via-extra-fields-php - Third Party Advisory | |
| References | () https://www.wisdom.com.au/web/pegasus-cms - Product | |
| First Time |
Wisdom
Wisdom pegasus Cms |
05 Apr 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-05 21:16
Updated : 2026-04-24 15:42
NVD link : CVE-2019-25687
Mitre link : CVE-2019-25687
CVE.ORG link : CVE-2019-25687
JSON object : View
Products Affected
wisdom
- pegasus_cms
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
