Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2011-5239 | Traq versions 2.0 through 2.3 contain a remote code execution vulnerability in the admincp/common.php script. The flawed authorization logic fails to halt execution after a failed access check, allowing unauthenticated users to reach admin-only functionality. This can be exploited via plugins.php to inject and execute arbitrary PHP code. |
Sat, 22 Nov 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:traq:traq:*:*:*:*:*:*:*:* |
Sat, 16 Aug 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Traq
Traq traq |
|
| Vendors & Products |
Traq
Traq traq |
Thu, 14 Aug 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 Aug 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Traq versions 2.0 through 2.3 contain a remote code execution vulnerability in the admincp/common.php script. The flawed authorization logic fails to halt execution after a failed access check, allowing unauthenticated users to reach admin-only functionality. This can be exploited via plugins.php to inject and execute arbitrary PHP code. | |
| Title | Traq 2.0–2.3 admincp/common.php RCE | |
| Weaknesses | CWE-306 CWE-94 |
|
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-14T02:05:51.847Z
Reserved: 2025-08-12T20:15:19.040Z
Link: CVE-2011-10013
Updated: 2025-08-14T13:44:50.620Z
Status : Deferred
Published: 2025-08-13T21:15:28.607
Modified: 2026-04-15T00:35:42.020
Link: CVE-2011-10013
No data.
OpenCVE Enrichment
Updated: 2025-08-16T21:41:25Z
EUVD