MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated OS command injection via rc/index.php. The $param variable from user input is interpolated into a command string within double quotes without sanitization via escapeshellarg(). The command is inserted into a database queue by safe_exec(), which performs no sanitization. The cycle_execs.php script, which is web-accessible without authentication, retrieves queued commands and passes them directly to exec(). An attacker can exploit a race condition by first triggering cycle_execs.php (which purges the queue and enters a polling loop), then injecting a malicious command via the rc endpoint while the worker is polling. The injected shell metacharacters expand inside double quotes, achieving remote code execution within one second.
References
| Link | Resource |
|---|---|
| https://chocapikk.com/posts/2026/majordomo-revisited/ | Third Party Advisory Exploit |
| https://github.com/sergejey/majordomo/pull/1177 | Issue Tracking Exploit |
| https://www.vulncheck.com/advisories/majordomo-command-injection-in-rcindexphp-via-race-condition | Third Party Advisory |
Configurations
History
20 Feb 2026, 20:02
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://chocapikk.com/posts/2026/majordomo-revisited/ - Third Party Advisory, Exploit | |
| References | () https://github.com/sergejey/majordomo/pull/1177 - Issue Tracking, Exploit | |
| References | () https://www.vulncheck.com/advisories/majordomo-command-injection-in-rcindexphp-via-race-condition - Third Party Advisory | |
| CPE | cpe:2.3:a:mjdm:majordomo:-:*:*:*:*:*:*:* | |
| Summary |
|
|
| First Time |
Mjdm
Mjdm majordomo |
18 Feb 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-18 22:16
Updated : 2026-02-20 20:02
NVD link : CVE-2026-27175
Mitre link : CVE-2026-27175
CVE.ORG link : CVE-2026-27175
JSON object : View
Products Affected
mjdm
- majordomo
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
