Mocodo Mocodo Online 4.2.6 and below is vulnerable to Remote Code Execution via /web/rewrite.php.
References
| Link | Resource |
|---|---|
| https://chocapikk.com/posts/2024/mocodo-vulnerabilities/ | Exploit Third Party Advisory |
| https://github.com/laowantong/mocodo/blob/11ca879060a68e06844058cd969c6379214cc2a8/web/rewrite.php#L45 | Product |
| https://chocapikk.com/posts/2024/mocodo-vulnerabilities/ | Exploit Third Party Advisory |
| https://github.com/laowantong/mocodo/blob/11ca879060a68e06844058cd969c6379214cc2a8/web/rewrite.php#L45 | Product |
Configurations
History
10 Jun 2025, 17:25
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://chocapikk.com/posts/2024/mocodo-vulnerabilities/ - Exploit, Third Party Advisory | |
| References | () https://github.com/laowantong/mocodo/blob/11ca879060a68e06844058cd969c6379214cc2a8/web/rewrite.php#L45 - Product | |
| CPE | cpe:2.3:a:mocodo:mocodo_online:*:*:*:*:*:*:*:* | |
| First Time |
Mocodo
Mocodo mocodo Online |
Information
Published : 2024-05-24 21:15
Updated : 2025-06-10 17:25
NVD link : CVE-2024-35373
Mitre link : CVE-2024-35373
CVE.ORG link : CVE-2024-35373
JSON object : View
Products Affected
mocodo
- mocodo_online
CWE
CWE-75
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)
