PopojiCMS 2.0.1 contains an authenticated remote command execution vulnerability that allows administrative users to inject malicious PHP code through the metadata settings endpoint. Attackers can log in and modify the meta content to create a web shell that executes arbitrary system commands through a GET parameter.
References
| Link | Resource |
|---|---|
| https://github.com/PopojiCMS/PopojiCMS | Product |
| https://github.com/PopojiCMS/PopojiCMS/archive/refs/tags/v2.0.1.zip | Release Notes |
| https://www.exploit-db.com/exploits/52022 | Exploit Third Party Advisory |
| https://www.popojicms.org/ | Product |
| https://www.vulncheck.com/advisories/popojicms-remote-command-execution-via-authenticated-metadata-settings | Third Party Advisory |
| https://github.com/PopojiCMS/PopojiCMS/archive/refs/tags/v2.0.1.zip | Release Notes |
Configurations
History
19 Dec 2025, 17:42
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Popojicms
Popojicms popojicms |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
| CPE | cpe:2.3:a:popojicms:popojicms:2.0.1:*:*:*:*:*:*:* | |
| References | () https://github.com/PopojiCMS/PopojiCMS - Product | |
| References | () https://github.com/PopojiCMS/PopojiCMS/archive/refs/tags/v2.0.1.zip - Release Notes | |
| References | () https://www.exploit-db.com/exploits/52022 - Exploit, Third Party Advisory | |
| References | () https://www.popojicms.org/ - Product | |
| References | () https://www.vulncheck.com/advisories/popojicms-remote-command-execution-via-authenticated-metadata-settings - Third Party Advisory |
11 Dec 2025, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/PopojiCMS/PopojiCMS/archive/refs/tags/v2.0.1.zip - |
10 Dec 2025, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-10 22:16
Updated : 2025-12-19 17:42
NVD link : CVE-2024-58284
Mitre link : CVE-2024-58284
CVE.ORG link : CVE-2024-58284
JSON object : View
Products Affected
popojicms
- popojicms
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
