CVE-2026-27174
CRITICAL EXPLOITED NUCLEIMajorDoMo - Unauthenticated RCE
Title source: llmDescription
MajorDoMo (aka Major Domestic Module) allows unauthenticated remote code execution via the admin panel's PHP console feature. An include order bug in modules/panel.class.php causes execution to continue past a redirect() call that lacks an exit statement, allowing unauthenticated requests to reach the ajax handler in inc_panel_ajax.php. The console handler within that file passes user-supplied input from GET parameters (via register_globals) directly to eval() without any authentication check. An attacker can execute arbitrary PHP code by sending a crafted GET request to /admin.php with ajax_panel, op, and command parameters.
Exploits (3)
github
WORKING POC
10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2026/CVE-2026-27174
metasploit
WORKING POC
EXCELLENT
rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/majordomo_console_eval_rce.rb
Nuclei Templates (1)
MajorDoMo - Unauthenticated RCE
CRITICALVERIFIEDby 0x_Akoko
Shodan:
http.html:"templates/application.html"
FOFA:
body="templates/application.html"
Scores
CVSS v3
9.8
EPSS
0.8495
EPSS Percentile
99.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2026-04-18
CWE
CWE-94
Status
published
Products (1)
mjdm/majordomo
Published
Feb 18, 2026
Tracked Since
Feb 19, 2026