CVE-2024-28187

SOY CMS is an open source CMS (content management system) that allows you to build blogs and online shops. SOY CMS versions prior to 3.14.2 are vulnerable to an OS Command Injection vulnerability within the file upload feature when accessed by an administrator. The vulnerability enables the execution of arbitrary OS commands through specially crafted file names containing a semicolon, affecting the jpegoptim functionality. This vulnerability has been patched in version 3.14.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:saitodev:soy_cms:*:*:*:*:*:*:*:*

History

10 Apr 2025, 19:18

Type Values Removed Values Added
References () https://github.com/inunosinsi/soycms/commit/9b0e452f628df28dec69cd72b6b55db21066cbf8 - () https://github.com/inunosinsi/soycms/commit/9b0e452f628df28dec69cd72b6b55db21066cbf8 - Patch
References () https://github.com/inunosinsi/soycms/security/advisories/GHSA-qg3q-hfgc-5jmm - () https://github.com/inunosinsi/soycms/security/advisories/GHSA-qg3q-hfgc-5jmm - Vendor Advisory
First Time Saitodev soy Cms
Saitodev
CPE cpe:2.3:a:saitodev:soy_cms:*:*:*:*:*:*:*:*

Information

Published : 2024-03-11 20:15

Updated : 2025-04-10 19:18


NVD link : CVE-2024-28187

Mitre link : CVE-2024-28187

CVE.ORG link : CVE-2024-28187


JSON object : View

Products Affected

saitodev

  • soy_cms
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')