Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical MetInfo CMS Flaw Exploited for Code Execution

Critical MetInfo CMS Flaw Exploited for Code Execution

Posted on May 5, 2026 By CWS

In recent developments, cybercriminals have been targeting a significant security vulnerability in MetInfo CMS, an open-source content management system, according to VulnCheck’s latest research. This critical flaw, identified as CVE-2026-29014 with a high CVSS score of 9.8, allows for code injection, leading to unauthorized code execution.

Understanding the Vulnerability

The CVE-2026-29014 flaw is a PHP code injection vulnerability present in MetInfo CMS versions 7.9, 8.0, and 8.1. This security gap enables remote attackers to execute arbitrary code by sending specially crafted requests containing malicious PHP code, as highlighted by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD).

The vulnerability arises due to inadequate input neutralization in the execution path, which can provide attackers full control over the compromised server. Security researcher Egidio Romano, who identified the flaw, pinpointed its origin to a script located in “/app/system/weixin/include/class/weixinreply.class.php” that fails to properly sanitize user inputs during Weixin (also known as WeChat) API requests.

Exploitation and Impact

This vulnerability allows remote, unauthenticated attackers to inject and run arbitrary PHP code, particularly when certain conditions are met. For instance, on non-Windows servers running MetInfo, the “/cache/weixin/” directory must exist for successful exploitation. This directory is automatically created during the installation and configuration of the official WeChat plugin.

The exploitation of CVE-2026-29014 began after MetInfo released patches on April 7, 2026. Since April 25, there have been reports of targeted attacks on vulnerable systems, particularly against honeypots in the U.S. and Singapore. Initially, these attacks were limited and involved automated probing, but activity escalated significantly on May 1, 2026, especially targeting IP addresses in China and Hong Kong.

Current and Future Outlook

The surge in exploitation attempts highlights the urgent need for organizations using MetInfo CMS to apply the security patches released by MetInfo promptly. With approximately 2,000 MetInfo CMS instances publicly accessible online, primarily in China, the risk of widespread exploitation remains high.

Moving forward, it is crucial for developers and administrators to ensure proper input sanitization and to stay updated with the latest security patches to safeguard against such vulnerabilities. As attackers continue to evolve their tactics, proactive security measures and continuous monitoring will be essential in mitigating potential threats.

The Hacker News Tags:China, CVE-2026-29014, Cybersecurity, Hong Kong, MetInfo CMS, network security, PHP code injection, remote code execution, sanitization flaw, security patch, security research, Singapore, U.S, Vulnerability, Weixin API

Post navigation

Previous Post: Phishing Tactics Exploit Amazon SES to Bypass Email Security
Next Post: Joey Melo Discusses AI Hacking Techniques

Related Posts

DoNot APT Expands Operations, Targets European Foreign Ministries with LoptikMod Malware DoNot APT Expands Operations, Targets European Foreign Ministries with LoptikMod Malware The Hacker News
North Korea-Linked UNC1069 Targets Crypto with AI Attacks North Korea-Linked UNC1069 Targets Crypto with AI Attacks The Hacker News
Microsoft and CrowdStrike Launch Shared Threat Actor Glossary to Cut Attribution Confusion Microsoft and CrowdStrike Launch Shared Threat Actor Glossary to Cut Attribution Confusion The Hacker News
Critical n8n Flaw (CVSS 9.9) Enables Arbitrary Code Execution Across Thousands of Instances Critical n8n Flaw (CVSS 9.9) Enables Arbitrary Code Execution Across Thousands of Instances The Hacker News
AI Becomes Russia’s New Cyber Weapon in War on Ukraine AI Becomes Russia’s New Cyber Weapon in War on Ukraine The Hacker News
Microsoft Flags Multi-Stage AitM Phishing and BEC Attacks Targeting Energy Firms Microsoft Flags Multi-Stage AitM Phishing and BEC Attacks Targeting Energy Firms The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Apache HTTP/2 Vulnerability Exposes Systems to RCE and DoS
  • GnuTLS 3.8.13 Update: Key Security Vulnerabilities Fixed
  • Latvian Hacker Jailed for Karakurt Ransomware Crimes
  • China-Linked UAT-8302 Targets Global Governments with APT Malware
  • Supply Chain Attack Targets DAEMON Tools Software

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Apache HTTP/2 Vulnerability Exposes Systems to RCE and DoS
  • GnuTLS 3.8.13 Update: Key Security Vulnerabilities Fixed
  • Latvian Hacker Jailed for Karakurt Ransomware Crimes
  • China-Linked UAT-8302 Targets Global Governments with APT Malware
  • Supply Chain Attack Targets DAEMON Tools Software

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark