CVE-2026-3395: Php [PoC]
CVE-2026-3395
A flaw has been found in MaxSite CMS up to 109.1. This impacts the function eval of the file application/maxsite/admin/plugins/editor_markitup/preview-ajax.php of the component MarkItUp Preview AJAX E...
Security Advisory: Critical Code Injection Vulnerability in MaxSite CMS
Overview
A high-severity security vulnerability has been identified in MaxSite CMS versions up to and including 109.1. The flaw resides in the MarkItUp Preview AJAX Endpoint, a component used for content preview. This vulnerability allows a remote attacker to inject and execute arbitrary code on the server, potentially granting them full control over the affected web application.
Vulnerability Details
The vulnerability exists in the preview-ajax.php file, where user-supplied input is improperly passed to the eval() function without adequate validation or sanitization. Because this endpoint is accessible remotely without requiring full administrative privileges in some configurations, an attacker can craft a malicious request containing PHP code. The server will then execute this code, leading to a complete compromise.
The Common Vulnerability Scoring System (CVSS) rates this issue as 7.3 (HIGH), indicating a significant risk. A functional exploit for this vulnerability is publicly available, increasing the likelihood of active attacks.
Impact
If successfully exploited, this vulnerability can have severe consequences:
- Full System Compromise: Attackers can execute any command or code on the web server with the permissions of the web server process.
- Data Theft or Destruction: Sensitive data, including user information, can be accessed, stolen, or deleted.
- Website Defacement: Attackers can alter website content.
- Launching Point for Further Attacks: The compromised server can be used to attack other internal systems or distribute malware to visitors.
Affected Products
- MaxSite CMS versions 109.1 and all prior versions.
Remediation and Mitigation
The only complete solution is to update the software immediately.
- Immediate Upgrade: Upgrade MaxSite CMS to version 109.2 or later. This version contains the fix (commit
08937a3c5d672a242d68f53e9fccf8a748820ef3) that addresses the code injection flaw. - Verification: After upgrading, verify the patch is applied by confirming the version number in your admin panel.
- Temporary Mitigation (If Upgrade is Delayed): As a temporary measure, consider restricting access to the
/admin/plugins/editor_markitup/directory at the web server (e.g.,.htaccessfor Apache) or network firewall level, especially from untrusted networks. Note that this may break the preview functionality and is not a substitute for patching. - General Best Practice: Regularly review user accounts with access to the admin panel and ensure strong, unique passwords are in use.
The MaxSite CMS maintainer was notified and responded promptly with a professional fix. Users are strongly advised to apply the update without delay to protect their systems from potential exploitation.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Public PoC References
Unverified third-party code
These repositories are publicly listed on GitHub and have not been audited by Yazoul Security. They may contain malware, backdoors, destructive payloads, or operational security risks (telemetry, exfiltration). Treat them as hostile binaries. Inspect source before execution. Run only in isolated, disposable lab environments (offline VM, no credentials, no production data).
Authorized use only. This information is provided for defensive research, detection engineering, and patch validation. Using exploit code against systems you do not own or do not have explicit written permission to test is illegal in most jurisdictions and violates Yazoul's terms of use.
| Repository | Stars |
|---|---|
| mbanyamer/CVE-2026-3395-MaxSite-CMS-Unauthenticated-RCE | ★ 5 |
Showing 1 of 1 known references. Source: nomi-sec/PoC-in-GitHub.
Related Advisories
A vulnerability was found in code-projects Simple Flight Ticket Booking System 1.0. This issue affects some unknown processing of the file /Adminsearch.php. The manipulation of the argument flightno r...
A security flaw has been discovered in code-projects Simple Flight Ticket Booking System 1.0. This affects an unknown function of the file /Admindelete.php. The manipulation of the argument flightno r...
A security flaw has been discovered in code-projects Simple Flight Ticket Booking System 1.0. The impacted element is an unknown function of the file /login.php. Performing a manipulation of the argum...
A weakness has been identified in code-projects Simple Flight Ticket Booking System 1.0. This affects an unknown function of the file /register.php. Executing a manipulation of the argument Username c...
Other PHP Vulnerabilities
Jettweb PHP Hazir Rent A Car Sitesi Scripti V2 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the arac_kateg...
Jettweb Php Hazir Ilan Sitesi Scripti V2 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'kat' parameter....
Jettweb PHP Hazir Haber Sitesi Scripti V2 contains an authentication bypass vulnerability in the administration panel that allows unauthenticated attackers to gain administrative access by exploiting ...
Jettweb PHP Hazir Haber Sitesi Scripti V3 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the videoid paramet...