Description
Open Web Analytics (OWA) before 1.7.4 allows an unauthenticated remote attacker to obtain sensitive user information, which can be used to gain admin privileges by leveraging cache hashes. This occurs because files generated with '<?php (instead of the intended "<?php sequence) aren't handled by the PHP interpreter.
Exploits (9)
metasploit
WORKING POC
EXCELLENT
by Jacob Ebben, Dennis Pfleger · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/open_web_analytics_rce.rb
Nuclei Templates (1)
Open Web Analytics 1.7.3 - Remote Code Execution
CRITICALVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan:
cpe:"cpe:2.3:a:openwebanalytics:open_web_analytics"
References (4)
Scores
CVSS v3
9.8
EPSS
0.9385
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lab Environment
COMMUNITY
Community Lab
+5 more repos
Details
CWE
CWE-269
Status
published
Products (2)
open-web-analytics/open-web-analytics
0 - 1.7.4Packagist
openwebanalytics/open_web_analytics
< 1.7.4
Published
Mar 18, 2022
Tracked Since
Feb 18, 2026