CVE-2024-58284

PopojiCMS 2.0.1 contains an authenticated remote command execution vulnerability that allows administrative users to inject malicious PHP code through the metadata settings endpoint. Attackers can log in and modify the meta content to create a web shell that executes arbitrary system commands through a GET parameter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:popojicms:popojicms:2.0.1:*:*:*:*:*:*:*

History

19 Dec 2025, 17:42

Type Values Removed Values Added
First Time Popojicms
Popojicms popojicms
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2
CPE cpe:2.3:a:popojicms:popojicms:2.0.1:*:*:*:*:*:*:*
References () https://github.com/PopojiCMS/PopojiCMS - () https://github.com/PopojiCMS/PopojiCMS - Product
References () https://github.com/PopojiCMS/PopojiCMS/archive/refs/tags/v2.0.1.zip - () https://github.com/PopojiCMS/PopojiCMS/archive/refs/tags/v2.0.1.zip - Release Notes
References () https://www.exploit-db.com/exploits/52022 - () https://www.exploit-db.com/exploits/52022 - Exploit, Third Party Advisory
References () https://www.popojicms.org/ - () https://www.popojicms.org/ - Product
References () https://www.vulncheck.com/advisories/popojicms-remote-command-execution-via-authenticated-metadata-settings - () https://www.vulncheck.com/advisories/popojicms-remote-command-execution-via-authenticated-metadata-settings - Third Party Advisory

11 Dec 2025, 16:16

Type Values Removed Values Added
References () https://github.com/PopojiCMS/PopojiCMS/archive/refs/tags/v2.0.1.zip - () https://github.com/PopojiCMS/PopojiCMS/archive/refs/tags/v2.0.1.zip -

10 Dec 2025, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-10 22:16

Updated : 2025-12-19 17:42


NVD link : CVE-2024-58284

Mitre link : CVE-2024-58284

CVE.ORG link : CVE-2024-58284


JSON object : View

Products Affected

popojicms

  • popojicms
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')