CVE-2023-54339 PUBLISHED

Webgrind 1.1 - Remote Command Execution (RCE) via dataFile Parameter

Assigner: VulnCheck
Reserved: 10.01.2026 Published: 13.01.2026 Updated: 05.03.2026

Webgrind 1.1 contains a remote command execution vulnerability that allows unauthenticated attackers to inject OS commands via the dataFile parameter in index.php. Attackers can execute arbitrary system commands by manipulating the dataFile parameter, such as using payload '0%27%26calc.exe%26%27' to execute commands on the target system.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 9.3

Product Status

Vendor jokkedk
Product Webgrind
Versions
  • Version 1.1 is affected

Credits

  • Rafael Pedrero finder

References

Problem Types

  • Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CWE