CVE-2020-35131
CRITICAL EXPLOITED NUCLEICockpit <0.6.1 - RCE
Title source: llmDescription
Cockpit before 0.6.1 allows an attacker to inject custom PHP code and achieve Remote Command Execution via registerCriteriaFunction in lib/MongoLite/Database.php, as demonstrated by values in JSON data to the /auth/check or /auth/requestreset URI.
Exploits (1)
Nuclei Templates (1)
Cockpit CMS 0.6.1 - Remote Code Execution
CRITICALVERIFIEDby DhiyaneshDK
Shodan:
http.html:"cockpit"
FOFA:
app="Cockpit"
Scores
CVSS v3
9.8
EPSS
0.9115
EPSS Percentile
99.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2023-11-13
CWE
CWE-94
Status
published
Products (1)
agentejo/cockpit
< 0.6.1
Published
Jan 08, 2021
Tracked Since
Feb 18, 2026