CVE-2012-5357
CRITICALEktron CMS <8.02 SP5 - RCE
Title source: llmDescription
Ektron Content Management System (CMS) before 8.02 SP5 uses the XslCompiledTransform class with enablescript set to true, which allows remote attackers to execute arbitrary code with NETWORK SERVICE privileges via crafted XSL data.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/23155
metasploit
WORKING POC
EXCELLENT
by Rich Lundeen, juan vazquez, Nicolas, Gregoire · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/ektron_xslt_exec.rb
References (4)
Scores
CVSS v3
9.8
EPSS
0.8259
EPSS Percentile
99.2%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-19
Status
published
Products (1)
ektron/ektron_content_management_system
< 8.02
Published
Oct 30, 2017
Tracked Since
Feb 18, 2026