High (7.3)

CVE-2026-3395: Php [PoC]

CVE-2026-3395

A flaw has been found in MaxSite CMS up to 109.1. This impacts the function eval of the file application/maxsite/admin/plugins/editor_markitup/preview-ajax.php of the component MarkItUp Preview AJAX E...

Affected: PHP

Security Advisory: Critical Code Injection Vulnerability in MaxSite CMS

Overview

A high-severity security vulnerability has been identified in MaxSite CMS versions up to and including 109.1. The flaw resides in the MarkItUp Preview AJAX Endpoint, a component used for content preview. This vulnerability allows a remote attacker to inject and execute arbitrary code on the server, potentially granting them full control over the affected web application.

Vulnerability Details

The vulnerability exists in the preview-ajax.php file, where user-supplied input is improperly passed to the eval() function without adequate validation or sanitization. Because this endpoint is accessible remotely without requiring full administrative privileges in some configurations, an attacker can craft a malicious request containing PHP code. The server will then execute this code, leading to a complete compromise.

The Common Vulnerability Scoring System (CVSS) rates this issue as 7.3 (HIGH), indicating a significant risk. A functional exploit for this vulnerability is publicly available, increasing the likelihood of active attacks.

Impact

If successfully exploited, this vulnerability can have severe consequences:

  • Full System Compromise: Attackers can execute any command or code on the web server with the permissions of the web server process.
  • Data Theft or Destruction: Sensitive data, including user information, can be accessed, stolen, or deleted.
  • Website Defacement: Attackers can alter website content.
  • Launching Point for Further Attacks: The compromised server can be used to attack other internal systems or distribute malware to visitors.

Affected Products

  • MaxSite CMS versions 109.1 and all prior versions.

Remediation and Mitigation

The only complete solution is to update the software immediately.

  1. Immediate Upgrade: Upgrade MaxSite CMS to version 109.2 or later. This version contains the fix (commit 08937a3c5d672a242d68f53e9fccf8a748820ef3) that addresses the code injection flaw.
  2. Verification: After upgrading, verify the patch is applied by confirming the version number in your admin panel.
  3. Temporary Mitigation (If Upgrade is Delayed): As a temporary measure, consider restricting access to the /admin/plugins/editor_markitup/ directory at the web server (e.g., .htaccess for Apache) or network firewall level, especially from untrusted networks. Note that this may break the preview functionality and is not a substitute for patching.
  4. General Best Practice: Regularly review user accounts with access to the admin panel and ensure strong, unique passwords are in use.

The MaxSite CMS maintainer was notified and responded promptly with a professional fix. Users are strongly advised to apply the update without delay to protect their systems from potential exploitation.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Public PoC References

Unverified third-party code

These repositories are publicly listed on GitHub and have not been audited by Yazoul Security. They may contain malware, backdoors, destructive payloads, or operational security risks (telemetry, exfiltration). Treat them as hostile binaries. Inspect source before execution. Run only in isolated, disposable lab environments (offline VM, no credentials, no production data).

Authorized use only. This information is provided for defensive research, detection engineering, and patch validation. Using exploit code against systems you do not own or do not have explicit written permission to test is illegal in most jurisdictions and violates Yazoul's terms of use.

Repository Stars
mbanyamer/CVE-2026-3395-MaxSite-CMS-Unauthenticated-RCE ★ 5

Showing 1 of 1 known references. Source: nomi-sec/PoC-in-GitHub.

Related Advisories

Other PHP Vulnerabilities

View all PHP vulnerabilities →

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.