Description
Direct code injection vulnerability in CuteNews 1.3.6 and earlier allows remote attackers with administrative privileges to execute arbitrary PHP code via certain inputs that are injected into a template (.tpl) file.
Published: 2005-06-07
Score: 4.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Jan 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.5, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Cutephp Cutenews
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-01-16T19:13:11.881Z

Reserved: 2005-06-08T00:00:00.000Z

Link: CVE-2005-1876

cve-icon Vulnrichment

Updated: 2024-08-07T22:06:57.133Z

cve-icon NVD

Status : Modified

Published: 2005-06-09T04:00:00.000

Modified: 2026-04-16T00:27:16.627

Link: CVE-2005-1876

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses