Description
_RealmAdmin/login.asp in Realm CMS 2.3 and earlier allows remote attackers to bypass authentication and access admin pages via certain modified cookies, probably including (1) cUserRole, (2) cUserName, and (3) cUserID.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by BugReport.IR · textwebappsphp
https://www.exploit-db.com/exploits/5766
References (5)
Core 5
Core References
Exploit x_refsource_misc
http://bugreport.ir/index.php?/40
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/42960
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/5766
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/30583
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/29616
Scores
EPSS
0.0249
EPSS Percentile
85.4%
Details
CWE
CWE-264
Status
published
Products (1)
realm_project/realm_cms
2.3
Published
Jun 12, 2008
Tracked Since
Feb 18, 2026