ImpressCMS 1.4.2 contains a remote code execution vulnerability in the autotasks administrative interface that allows authenticated attackers to execute arbitrary PHP code by injecting malicious code into the sat_code parameter. Attackers can authenticate, submit a POST request to /modules/system/admin.php?fct=autotasks&op=mod with crafted sat_code containing PHP commands, which creates an executable file that accepts arbitrary commands via GET parameters.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sun, 10 May 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ImpressCMS 1.4.2 contains a remote code execution vulnerability in the autotasks administrative interface that allows authenticated attackers to execute arbitrary PHP code by injecting malicious code into the sat_code parameter. Attackers can authenticate, submit a POST request to /modules/system/admin.php?fct=autotasks&op=mod with crafted sat_code containing PHP commands, which creates an executable file that accepts arbitrary commands via GET parameters. | |
| Title | ImpressCMS 1.4.2 Remote Code Execution via Autotasks | |
| First Time appeared |
Impresscms
Impresscms impresscms |
|
| Weaknesses | CWE-94 | |
| CPEs | cpe:2.3:a:impresscms:impresscms:1.4.2:*:*:*:*:*:*:* | |
| Vendors & Products |
Impresscms
Impresscms impresscms |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-10T12:43:56.455Z
Reserved: 2026-02-01T11:24:18.717Z
Link: CVE-2021-47938
No data.
Status : Received
Published: 2026-05-10T13:16:30.100
Modified: 2026-05-10T13:16:30.100
Link: CVE-2021-47938
No data.
OpenCVE Enrichment
Updated: 2026-05-10T15:45:14Z
Weaknesses