CVE-2014-8998
X7 Chat <2.0.5.1 - Authenticated RCE
Title source: llmDescription
lib/message.php in X7 Chat 2.0.0 through 2.0.5.1 allows remote authenticated users to execute arbitrary PHP code via a crafted HTTP header to index.php, which is processed by the preg_replace function with the eval switch.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotephp
https://www.exploit-db.com/exploits/35183
metasploit
WORKING POC
EXCELLENT
rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/x7chat2_php_exec.rb
References (4)
Scores
EPSS
0.6600
EPSS Percentile
98.5%
Details
CWE
CWE-94
Status
published
Products (10)
x7chat/x7_chat
2.0.0 (6 CPE variants)
x7chat/x7_chat
2.0.1 a1
x7chat/x7_chat
2.0.2
x7chat/x7_chat
2.0.3
x7chat/x7_chat
2.0.4
x7chat/x7_chat
2.0.4.1
x7chat/x7_chat
2.0.4.3
x7chat/x7_chat
2.0.4.4
x7chat/x7_chat
2.0.5
x7chat/x7_chat
2.0.5.1
Published
Nov 20, 2014
Tracked Since
Feb 18, 2026