An issue was discovered in DedeCMS 5.7.118 allowing attackers to execute code via crafted setup tag values in a module upload.
References
| Link | Resource |
|---|---|
| https://gist.github.com/0psPwn/10c43912adee9bfe2ff4fec947d4ee5a | Exploit Third Party Advisory |
| https://www.dedecms.com/ | Product |
Configurations
History
06 Apr 2026, 15:29
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Dedecms
Dedecms dedecms |
|
| CPE | cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:* | |
| References | () https://gist.github.com/0psPwn/10c43912adee9bfe2ff4fec947d4ee5a - Exploit, Third Party Advisory | |
| References | () https://www.dedecms.com/ - Product |
01 Apr 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| CWE | CWE-94 |
01 Apr 2026, 17:28
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-01 17:28
Updated : 2026-04-06 15:29
NVD link : CVE-2026-30643
Mitre link : CVE-2026-30643
CVE.ORG link : CVE-2026-30643
JSON object : View
Products Affected
dedecms
- dedecms
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
