Description
Static code injection vulnerability in gooplecms/admin/account/action/editpass.php in Goople CMS 1.7 allows remote attackers to inject arbitrary PHP code into admin/userandpass.php via the (1) username and (2) password parameters. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by BeyazKurt · textwebappsphp
https://www.exploit-db.com/exploits/7205
References (3)
Core 3
Core References
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/32819
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/46800
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/33848
Scores
EPSS
0.0255
EPSS Percentile
85.6%
Details
CWE
CWE-20
Status
published
Products (1)
goople_cms/goople_cms
1.7
Published
Feb 11, 2009
Tracked Since
Feb 18, 2026