Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 13 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 13 Apr 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Pachno 1.0.6 contains a deserialization vulnerability that allows unauthenticated attackers to execute arbitrary code by injecting malicious serialized objects into cache files. Attackers can write PHP object payloads to world-writable cache files with predictable names in the cache directory, which are unserialized during framework bootstrap before authentication checks occur. | |
| Title | Pachno 1.0.6 FileCache Deserialization Remote Code Execution | |
| First Time appeared |
Pachno
Pachno pachno |
|
| Weaknesses | CWE-502 | |
| CPEs | cpe:2.3:a:pachno:pachno:1.0.6:*:*:*:*:*:*:* | |
| Vendors & Products |
Pachno
Pachno pachno |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-12T01:46:29.980Z
Reserved: 2026-04-08T13:39:22.100Z
Link: CVE-2026-40044
Updated: 2026-04-13T18:57:54.502Z
Status : Deferred
Published: 2026-04-13T19:16:52.290
Modified: 2026-04-17T15:28:29.690
Link: CVE-2026-40044
No data.
OpenCVE Enrichment
Updated: 2026-04-14T16:33:36Z