{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-7388","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-04-29T09:34:57.835Z","datePublished":"2026-04-29T15:15:16.230Z","dateUpdated":"2026-04-29T18:32:10.189Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-04-29T15:15:16.230Z"},"title":"EyouCMS Template File FilemanagerLogic.php editFile code injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-94","lang":"en","description":"Code Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"n/a","product":"EyouCMS","versions":[{"version":"1.7.0","status":"affected"},{"version":"1.7.1","status":"affected"},{"version":"1.7.2","status":"affected"},{"version":"1.7.3","status":"affected"},{"version":"1.7.4","status":"affected"},{"version":"1.7.5","status":"affected"},{"version":"1.7.6","status":"affected"},{"version":"1.7.7","status":"affected"},{"version":"1.7.8","status":"affected"},{"version":"1.7.9","status":"affected"}],"cpes":["cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*"],"modules":["Template File Handler"]}],"descriptions":[{"lang":"en","value":"A weakness has been identified in EyouCMS up to 1.7.9. Impacted is the function editFile of the file application/admin/logic/FilemanagerLogic.php of the component Template File Handler. Executing a manipulation can lead to code injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":4.7,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.7,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.8,"vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-04-29T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-04-29T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-04-29T11:40:12.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"anch0r (VulDB User)","type":"reporter"},{"lang":"en","value":"VulDB CNA Team","type":"coordinator"}],"references":[{"url":"https://vuldb.com/vuln/360113","name":"VDB-360113 | EyouCMS Template File FilemanagerLogic.php editFile code injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/vuln/360113/cti","name":"VDB-360113 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/submit/803102","name":"Submit #803102 | eyoucms EyouCMS <=1.7.9 Code Injection","tags":["third-party-advisory"]},{"url":"https://gitee.com/weng_xianhu/eyoucms/issues/IILDJS","tags":["exploit","issue-tracking"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-29T18:00:52.865156Z","id":"CVE-2026-7388","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-29T18:32:10.189Z"}}]}}