CVE-2020-35131

CRITICAL EXPLOITED NUCLEI

Cockpit <0.6.1 - RCE

Title source: llm

Description

Cockpit before 0.6.1 allows an attacker to inject custom PHP code and achieve Remote Command Execution via registerCriteriaFunction in lib/MongoLite/Database.php, as demonstrated by values in JSON data to the /auth/check or /auth/requestreset URI.

Exploits (1)

exploitdb WORKING POC
by Rafael Resende · textwebappsphp
https://www.exploit-db.com/exploits/49390

Nuclei Templates (1)

Cockpit CMS 0.6.1 - Remote Code Execution
CRITICALVERIFIEDby DhiyaneshDK
Shodan: http.html:"cockpit"
FOFA: app="Cockpit"

Scores

CVSS v3 9.8
EPSS 0.9115
EPSS Percentile 99.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2023-11-13
CWE
CWE-94
Status published
Products (1)
agentejo/cockpit < 0.6.1
Published Jan 08, 2021
Tracked Since Feb 18, 2026