aelsantex runcommand 2014-04-01, a plugin for DokuWiki, allows unauthenticated attackers to execute arbitrary system commands via lib/plugins/runcommand/postaction.php.
References
| Link | Resource |
|---|---|
| https://gist.github.com/NtustLin/f64528002e4f61874045799127dc49a4 | Third Party Advisory |
| https://github.com/aelsantex/runcommand | Product |
| https://www.dokuwiki.org/plugin:runcommand | Product |
Configurations
History
13 Feb 2026, 18:01
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:aelsantex:runcommand:2014-04-01:*:*:*:*:dokuwiki:*:* | |
| References | () https://gist.github.com/NtustLin/f64528002e4f61874045799127dc49a4 - Third Party Advisory | |
| References | () https://github.com/aelsantex/runcommand - Product | |
| References | () https://www.dokuwiki.org/plugin:runcommand - Product | |
| First Time |
Aelsantex runcommand
Aelsantex |
30 Jan 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-30 19:16
Updated : 2026-02-13 18:01
NVD link : CVE-2025-51958
Mitre link : CVE-2025-51958
CVE.ORG link : CVE-2025-51958
JSON object : View
Products Affected
aelsantex
- runcommand
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
