CVE-2026-27174

CRITICAL EXPLOITED NUCLEI

MajorDoMo - Unauthenticated RCE

Title source: llm

Description

MajorDoMo (aka Major Domestic Module) allows unauthenticated remote code execution via the admin panel's PHP console feature. An include order bug in modules/panel.class.php causes execution to continue past a redirect() call that lacks an exit statement, allowing unauthenticated requests to reach the ajax handler in inc_panel_ajax.php. The console handler within that file passes user-supplied input from GET parameters (via register_globals) directly to eval() without any authentication check. An attacker can execute arbitrary PHP code by sending a crafted GET request to /admin.php with ajax_panel, op, and command parameters.

Exploits (3)

github WORKING POC 10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2026/CVE-2026-27174
nomisec WORKING POC
by MaxMnMl · remote
https://github.com/MaxMnMl/majordomo-CVE-2026-27174-poc
metasploit WORKING POC EXCELLENT
rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/majordomo_console_eval_rce.rb

Nuclei Templates (1)

MajorDoMo - Unauthenticated RCE
CRITICALVERIFIEDby 0x_Akoko
Shodan: http.html:"templates/application.html"
FOFA: body="templates/application.html"

Scores

CVSS v3 9.8
EPSS 0.8495
EPSS Percentile 99.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2026-04-18
CWE
CWE-94
Status published
Products (1)
mjdm/majordomo
Published Feb 18, 2026
Tracked Since Feb 19, 2026