Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Backdoor attackers know, but most security teams haven’t shut them down yet

MetInfo CMS CVE-2026-29014 can be exploited for remote code execution attacks

Finalists announced for the 2026 European Sustainable Energy Award

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » MetInfo CMS CVE-2026-29014 can be exploited for remote code execution attacks
Identity

MetInfo CMS CVE-2026-29014 can be exploited for remote code execution attacks

By May 5, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMay 5, 2026Vulnerability/Network Security

Threat actors are actively exploiting a critical security flaw affecting the open-source content management system (CMS) known as MetInfo, according to new findings from VulnCheck.

The vulnerability in question is CVE-2026-29014 (CVSS score: 9.8), which is a code injection flaw that could lead to arbitrary code execution.

The NIST National Vulnerability Database (NVD) states, “MetInfo CMS versions 7.9, 8.0, and 8.1 contain an unauthenticated PHP code injection vulnerability that could allow a remote attacker to execute arbitrary code by sending a crafted request containing malicious PHP code.”

“An attacker could exploit insufficient input neutralization in the execution path to remotely execute code and gain complete control of an affected server.”

According to security researcher Egidio Romano, who discovered the vulnerability, the issue is due to the /app/system/weixin/include/class/weixinreply.class.php script not properly sanitizing the input provided by the user when making Weixin (also known as WeChat) API requests.

As a result, a remote unauthenticated attacker could exploit this loophole to inject and execute arbitrary PHP code. One of the key prerequisites for a successful exploit when MetInfo is running on a non-Windows server is that the “/cache/weixin/” directory must already exist. This directory is created when installing and configuring the official WeChat plugin.

A patch for CVE-2026-29014 was released by MetInfo on April 7, 2026. The vulnerability has been exploited as of April 25, with “a small number of exploits” deployed against susceptible honeypots in the United States and Singapore.

These efforts were initially sparse and related to automated probes, but activity spiked on May 1, 2026, with a focus on IP addresses in China and Hong Kong, said Caitlin Condon, vice president of security research at VulnCheck. As many as 2,000 MetInfo CMS instances are accessible online, most of them located in China.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleFinalists announced for the 2026 European Sustainable Energy Award
Next Article Backdoor attackers know, but most security teams haven’t shut them down yet

Related Posts

Backdoor attackers know, but most security teams haven’t shut them down yet

May 5, 2026

We scanned 1 million publicly available AI services. How Bad Is Security Really?

May 5, 2026

ScarCruft hacks gaming platforms and deploys BirdCall malware on Android and Windows

May 5, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Backdoor attackers know, but most security teams haven’t shut them down yet

MetInfo CMS CVE-2026-29014 can be exploited for remote code execution attacks

Finalists announced for the 2026 European Sustainable Energy Award

We scanned 1 million publicly available AI services. How Bad Is Security Really?

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.