Data Handling test in Cybersecurity Api and FFTETST - CVE-123-4567891

 

Data Handling test in Cybersecurity Api and FFTETST - CVE-123-4567891

Published: May 20, 2021 / Updated: November 28, 2025


Vulnerability identifier: #VU53402
CSH Severity: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-123-4567891
CWE-ID: CWE-19
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Cybersecurity Api
FFTETST
Software vendor:
CybersecurityHelp

Description

The vulnerability allows a remote attacker to execute arbitrary PHP code on the target system.

The vulnerability exists due to insecure eval() call when processing cache entries in MySQL Smarty cache feature. A remote attacker can inject specially crafted entries into the database and execute arbitrary PHP code on the system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system but requires the ability to inject specially crafted entries into the database, for instance in case of a SQL injection vulnerability, such vulnerability in Wishlist modules described as SB2022072609.

Note, the vulnerability is being actively exploited in the wild.


Remediation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

External links