Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 30 Jan 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ammarfaizi2
Ammarfaizi2 tea Latex |
|
| Vendors & Products |
Ammarfaizi2
Ammarfaizi2 tea Latex |
Thu, 29 Jan 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 29 Jan 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Tea LaTex 1.0 contains a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary shell commands through the /api.php endpoint. Attackers can craft a malicious LaTeX payload with shell commands that are executed when processed by the application's tex2png API action. | |
| Title | Tea LaTex 1.0 - Remote Code Execution | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-01-29T16:48:14.346Z
Reserved: 2026-01-28T18:18:30.520Z
Link: CVE-2020-37012
Updated: 2026-01-29T16:46:35.764Z
Status : Deferred
Published: 2026-01-29T15:16:08.520
Modified: 2026-04-15T00:35:42.020
Link: CVE-2020-37012
No data.
OpenCVE Enrichment
Updated: 2026-01-30T08:43:02Z