{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-21861","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-01-05T16:44:16.367Z","datePublished":"2026-03-31T00:43:58.296Z","dateUpdated":"2026-03-31T14:01:39.730Z"},"containers":{"cna":{"title":"baserCMS: OS Command Injection Leading to Remote Code Execution (RCE)","problemTypes":[{"descriptions":[{"cweId":"CWE-78","lang":"en","description":"CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.1,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","version":"3.1"}}],"references":[{"name":"https://github.com/baserproject/basercms/security/advisories/GHSA-qxmc-6f24-g86g","tags":["x_refsource_CONFIRM"],"url":"https://github.com/baserproject/basercms/security/advisories/GHSA-qxmc-6f24-g86g"},{"name":"https://basercms.net/security/JVN_20837860","tags":["x_refsource_MISC"],"url":"https://basercms.net/security/JVN_20837860"},{"name":"https://github.com/baserproject/basercms/releases/tag/5.2.3","tags":["x_refsource_MISC"],"url":"https://github.com/baserproject/basercms/releases/tag/5.2.3"}],"affected":[{"vendor":"baserproject","product":"basercms","versions":[{"version":"< 5.2.3","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-03-31T00:43:58.296Z"},"descriptions":[{"lang":"en","value":"baserCMS is a website development framework. Prior to version 5.2.3, baserCMS contains an OS command injection vulnerability in the core update functionality. An authenticated administrator can execute arbitrary OS commands on the server due to improper handling of user-controlled input that is directly passed to exec() without sufficient validation or escaping. This issue has been patched in version 5.2.3."}],"source":{"advisory":"GHSA-qxmc-6f24-g86g","discovery":"UNKNOWN"}},"adp":[{"references":[{"url":"https://github.com/baserproject/basercms/security/advisories/GHSA-qxmc-6f24-g86g","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-31T14:01:36.891582Z","id":"CVE-2026-21861","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-31T14:01:39.730Z"}}]}}