MetInfo CMS Vulnerability - PHP Code Injection Risk

Basically, there's a flaw in MetInfo CMS that lets hackers run harmful code remotely.
A critical vulnerability in MetInfo CMS could let attackers execute arbitrary PHP code. Versions 7.9, 8.0, and 8.1 are at risk. Stay alert for updates and potential fixes.
What Happened
A significant PHP code injection vulnerability has been discovered in MetInfo CMS, affecting versions 7.9, 8.0, and 8.1. The flaw lies within the weixinreply.class.php script, specifically in the wxAdminLogin() method. This vulnerability allows attackers to exploit the system by injecting malicious PHP code.
The Flaw
The issue arises from the improper sanitization of user input. Specifically, the parameters EventKey and FromUserName from HTTP requests are not adequately checked before being processed. This oversight allows attackers to use Path Traversal sequences to manipulate the cache::get() method, potentially leading to the inclusion of arbitrary PHP files.
What's at Risk
If exploited, this vulnerability could lead to unauthenticated Remote Code Execution (RCE). Attackers could execute arbitrary PHP code on the server, which poses a severe security risk. This is particularly concerning for organizations using MetInfo CMS in production environments, especially those that have the WeChat plugin installed.
Proof of Concept
A proof of concept is available, demonstrating how this vulnerability can be exploited. You can find it here.
Patch Status
Currently, there is no official solution or patch available from the MetInfo team. This lack of response from the vendor raises concerns about the urgency and seriousness of addressing the vulnerability.
Disclosure Timeline
- 26/02/2026: Vendor contacted via multiple email addresses, no response.
- 07/03/2026: Follow-up attempt, no response.
- 28/03/2026: Another attempt to contact the vendor, still no reply.
- 29/03/2026: Attempted to reach out through Weibo, no response.
- 30/03/2026: CVE identifier requested.
- 31/03/2026: CVE identifier assigned.
- 01/04/2026: Public disclosure of the vulnerability.
What You Should Do
Organizations using affected versions of MetInfo CMS should:
- Monitor for any unusual activity on their systems.
- Consider disabling the WeChat plugin if it is not essential.
- Stay updated on any announcements from MetInfo regarding a patch or mitigation strategies.
In summary, the MetInfo CMS PHP code injection vulnerability poses a high risk for users. Immediate attention and monitoring are advised until a fix is provided.