baserCMS is a website development framework. Prior to version 5.2.3, baserCMS contains an OS command injection vulnerability in the core update functionality. An authenticated administrator can execute arbitrary OS commands on the server due to improper handling of user-controlled input that is directly passed to exec() without sufficient validation or escaping. This issue has been patched in version 5.2.3.
References
| Link | Resource |
|---|---|
| https://basercms.net/security/JVN_20837860 | Vendor Advisory |
| https://github.com/baserproject/basercms/releases/tag/5.2.3 | Release Notes |
| https://github.com/baserproject/basercms/security/advisories/GHSA-qxmc-6f24-g86g | Exploit Vendor Advisory |
| https://github.com/baserproject/basercms/security/advisories/GHSA-qxmc-6f24-g86g | Exploit Vendor Advisory |
Configurations
History
01 Apr 2026, 20:29
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Basercms basercms
Basercms |
|
| CPE | cpe:2.3:a:basercms:basercms:*:*:*:*:*:*:*:* | |
| References | () https://basercms.net/security/JVN_20837860 - Vendor Advisory | |
| References | () https://github.com/baserproject/basercms/releases/tag/5.2.3 - Release Notes | |
| References | () https://github.com/baserproject/basercms/security/advisories/GHSA-qxmc-6f24-g86g - Exploit, Vendor Advisory |
31 Mar 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References | () https://github.com/baserproject/basercms/security/advisories/GHSA-qxmc-6f24-g86g - |
31 Mar 2026, 01:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-31 01:16
Updated : 2026-04-01 20:29
NVD link : CVE-2026-21861
Mitre link : CVE-2026-21861
CVE.ORG link : CVE-2026-21861
JSON object : View
Products Affected
basercms
- basercms
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
