In RaspAP raspap-webgui 3.0.9 and earlier, a command injection vulnerability exists in the clearlog.php script. The vulnerability is due to improper sanitization of user input passed via the logfile parameter.
References
Configurations
History
02 Jul 2025, 20:41
Type | Values Removed | Values Added |
---|---|---|
First Time |
Raspap raspap-webgui
Raspap |
|
CPE | cpe:2.3:a:raspap:raspap-webgui:*:*:*:*:*:*:*:* | |
References | () https://gist.github.com/1047524396/ab997b902ec892e592a0df93f38e6941 - Third Party Advisory | |
References | () https://github.com/RaspAP/raspap-webgui/blob/3.0.9/ajax/logging/clearlog.php - Product | |
References | () https://github.com/raspap/raspap-webgui/commit/c98d2b0c15942b4829d31dec615b9b40cc6faa14#diff-939ee414d82245c3b3dd7d36b57f10706e06e8f0871b24bdcf9de6e0d181c4c9 - Patch |
03 Dec 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CWE | CWE-94 |
29 Nov 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-29 18:15
Updated : 2025-07-02 20:41
NVD link : CVE-2024-36622
Mitre link : CVE-2024-36622
CVE.ORG link : CVE-2024-36622
JSON object : View
Products Affected
raspap
- raspap-webgui
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')