Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical MetInfo CMS Flaw Exploited for Code Execution

Critical MetInfo CMS Flaw Exploited for Code Execution

Posted on May 5, 2026 By CWS

In recent developments, cybercriminals have been targeting a significant security vulnerability in MetInfo CMS, an open-source content management system, according to VulnCheck’s latest research. This critical flaw, identified as CVE-2026-29014 with a high CVSS score of 9.8, allows for code injection, leading to unauthorized code execution.

Understanding the Vulnerability

The CVE-2026-29014 flaw is a PHP code injection vulnerability present in MetInfo CMS versions 7.9, 8.0, and 8.1. This security gap enables remote attackers to execute arbitrary code by sending specially crafted requests containing malicious PHP code, as highlighted by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD).

The vulnerability arises due to inadequate input neutralization in the execution path, which can provide attackers full control over the compromised server. Security researcher Egidio Romano, who identified the flaw, pinpointed its origin to a script located in “/app/system/weixin/include/class/weixinreply.class.php” that fails to properly sanitize user inputs during Weixin (also known as WeChat) API requests.

Exploitation and Impact

This vulnerability allows remote, unauthenticated attackers to inject and run arbitrary PHP code, particularly when certain conditions are met. For instance, on non-Windows servers running MetInfo, the “/cache/weixin/” directory must exist for successful exploitation. This directory is automatically created during the installation and configuration of the official WeChat plugin.

The exploitation of CVE-2026-29014 began after MetInfo released patches on April 7, 2026. Since April 25, there have been reports of targeted attacks on vulnerable systems, particularly against honeypots in the U.S. and Singapore. Initially, these attacks were limited and involved automated probing, but activity escalated significantly on May 1, 2026, especially targeting IP addresses in China and Hong Kong.

Current and Future Outlook

The surge in exploitation attempts highlights the urgent need for organizations using MetInfo CMS to apply the security patches released by MetInfo promptly. With approximately 2,000 MetInfo CMS instances publicly accessible online, primarily in China, the risk of widespread exploitation remains high.

Moving forward, it is crucial for developers and administrators to ensure proper input sanitization and to stay updated with the latest security patches to safeguard against such vulnerabilities. As attackers continue to evolve their tactics, proactive security measures and continuous monitoring will be essential in mitigating potential threats.

The Hacker News Tags:China, CVE-2026-29014, Cybersecurity, Hong Kong, MetInfo CMS, network security, PHP code injection, remote code execution, sanitization flaw, security patch, security research, Singapore, U.S, Vulnerability, Weixin API

Post navigation

Previous Post: Phishing Tactics Exploit Amazon SES to Bypass Email Security
Next Post: Joey Melo Discusses AI Hacking Techniques

Related Posts

U.S. DoJ Seizes 4 Domains Supporting Cybercrime Crypting Services in Global Operation U.S. DoJ Seizes 4 Domains Supporting Cybercrime Crypting Services in Global Operation The Hacker News
HiddenGh0st, Winos and kkRAT Exploit SEO, GitHub Pages in Chinese Malware Attacks HiddenGh0st, Winos and kkRAT Exploit SEO, GitHub Pages in Chinese Malware Attacks The Hacker News
The Secret Defense Strategy of Four Critical Industries Combating Advanced Cyber Threats The Secret Defense Strategy of Four Critical Industries Combating Advanced Cyber Threats The Hacker News
Cisco Warns of Active Attacks Exploiting Unpatched 0-Day in AsyncOS Email Security Appliances Cisco Warns of Active Attacks Exploiting Unpatched 0-Day in AsyncOS Email Security Appliances The Hacker News
Fake Kling AI Facebook Ads Deliver RAT Malware to Over 22 Million Potential Victims Fake Kling AI Facebook Ads Deliver RAT Malware to Over 22 Million Potential Victims The Hacker News
Fake OSINT and GPT Utility GitHub Repos Spread PyStoreRAT Malware Payloads Fake OSINT and GPT Utility GitHub Repos Spread PyStoreRAT Malware Payloads The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Alerts US Firms to Advanced Phishing Scheme
  • Rising Cyber Threats Target Education Sector Globally
  • Joey Melo Discusses AI Hacking Techniques
  • Critical MetInfo CMS Flaw Exploited for Code Execution
  • Phishing Tactics Exploit Amazon SES to Bypass Email Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Alerts US Firms to Advanced Phishing Scheme
  • Rising Cyber Threats Target Education Sector Globally
  • Joey Melo Discusses AI Hacking Techniques
  • Critical MetInfo CMS Flaw Exploited for Code Execution
  • Phishing Tactics Exploit Amazon SES to Bypass Email Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark