{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-5248","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-03-31T16:00:46.705Z","datePublished":"2026-04-01T00:45:12.460Z","dateUpdated":"2026-04-01T12:14:32.764Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-04-01T00:45:12.460Z"},"title":"gougucms User Registration Login.php reg_submit dynamically-determined object attributes","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-915","lang":"en","description":"Dynamically-Determined Object Attributes"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-913","lang":"en","description":"Dynamically-Managed Code Resources"}]}],"affected":[{"vendor":"n/a","product":"gougucms","versions":[{"version":"4.08.18","status":"affected"}],"cpes":["cpe:2.3:a:gougucms:gougucms:*:*:*:*:*:*:*:*"],"modules":["User Registration Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in gougucms 4.08.18. This affects the function reg_submit of the file gougucms-master\\app\\home\\controller\\Login.php of the component User Registration Handler. Such manipulation of the argument level leads to dynamically-determined object attributes. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-03-31T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-03-31T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-03-31T18:06:04.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"thinhnee (VulDB User)","type":"reporter"},{"lang":"en","value":"VulDB","type":"coordinator"}],"references":[{"url":"https://vuldb.com/vuln/354429","name":"VDB-354429 | gougucms User Registration Login.php reg_submit dynamically-determined object attributes","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/vuln/354429/cti","name":"VDB-354429 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/submit/780589","name":"Submit #780589 | 勾股开源 gougucms v4.08.18 Business Logic Errors","tags":["third-party-advisory"]},{"url":"https://thinhneee.github.io/posts/gougu-mass-assign/","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-01T12:12:35.114498Z","id":"CVE-2026-5248","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-01T12:14:32.764Z"}}]}}