MajorDoMo (aka Major Domestic Module) allows unauthenticated remote code execution via the admin panel's PHP console feature. An include order bug in modules/panel.class.php causes execution to continue past a redirect() call that lacks an exit statement, allowing unauthenticated requests to reach the ajax handler in inc_panel_ajax.php. The console handler within that file passes user-supplied input from GET parameters (via register_globals) directly to eval() without any authentication check. An attacker can execute arbitrary PHP code by sending a crafted GET request to /admin.php with ajax_panel, op, and command parameters.
References
| Link | Resource |
|---|---|
| https://chocapikk.com/posts/2026/majordomo-revisited/ | Third Party Advisory Exploit |
| https://github.com/sergejey/majordomo/pull/1177 | Issue Tracking Exploit |
| https://www.vulncheck.com/advisories/majordomo-unauthenticated-remote-code-execution-via-admin-console-eval | Third Party Advisory |
Configurations
History
20 Feb 2026, 20:02
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:mjdm:majordomo:-:*:*:*:*:*:*:* | |
| First Time |
Mjdm
Mjdm majordomo |
|
| References | () https://chocapikk.com/posts/2026/majordomo-revisited/ - Third Party Advisory, Exploit | |
| References | () https://github.com/sergejey/majordomo/pull/1177 - Issue Tracking, Exploit | |
| References | () https://www.vulncheck.com/advisories/majordomo-unauthenticated-remote-code-execution-via-admin-console-eval - Third Party Advisory | |
| Summary |
|
18 Feb 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-18 22:16
Updated : 2026-02-20 20:02
NVD link : CVE-2026-27174
Mitre link : CVE-2026-27174
CVE.ORG link : CVE-2026-27174
JSON object : View
Products Affected
mjdm
- majordomo
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
