Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 11 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 10 May 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ImpressCMS 1.4.2 contains a remote code execution vulnerability in the autotasks administrative interface that allows authenticated attackers to execute arbitrary PHP code by injecting malicious code into the sat_code parameter. Attackers can authenticate, submit a POST request to /modules/system/admin.php?fct=autotasks&op=mod with crafted sat_code containing PHP commands, which creates an executable file that accepts arbitrary commands via GET parameters. | |
| Title | ImpressCMS 1.4.2 Remote Code Execution via Autotasks | |
| First Time appeared |
Impresscms
Impresscms impresscms |
|
| Weaknesses | CWE-94 | |
| CPEs | cpe:2.3:a:impresscms:impresscms:1.4.2:*:*:*:*:*:*:* | |
| Vendors & Products |
Impresscms
Impresscms impresscms |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-11T11:24:06.736Z
Reserved: 2026-02-01T11:24:18.717Z
Link: CVE-2021-47938
Updated: 2026-05-11T11:24:02.591Z
Status : Deferred
Published: 2026-05-10T13:16:30.100
Modified: 2026-05-12T14:24:15.210
Link: CVE-2021-47938
No data.
OpenCVE Enrichment
Updated: 2026-05-10T15:45:14Z