CVE-2023-53945
Published: 19 December 2025
Description
BrainyCP 1.0 contains an authenticated remote code execution vulnerability that allows logged-in users to inject arbitrary commands through the crontab configuration interface. Attackers can exploit the crontab endpoint by adding a malicious command that spawns a reverse shell to a…
more
specified IP and port.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the improper input validation flaw in the crontab interface that enables authenticated OS command injection.
Requires identification, reporting, and correction of the specific flaw allowing arbitrary command injection via the crontab endpoint.
Enforces least privilege to restrict low-privilege authenticated users from executing arbitrary commands, limiting RCE impact.
Security SummaryAI
CVE-2023-53945 is an authenticated remote code execution vulnerability in BrainyCP version 1.0, stemming from improper input validation in the crontab configuration interface. This flaw, classified under CWE-78 (OS Command Injection), enables logged-in users to inject arbitrary commands via the crontab endpoint. The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), highlighting its high severity due to network accessibility and significant impact potential.
An attacker with valid low-privilege credentials can exploit this remotely by submitting a malicious command through the crontab interface, such as one that spawns a reverse shell to an attacker-controlled IP and port. No user interaction is required beyond authentication, and the low attack complexity makes it accessible to attackers who have obtained credentials, potentially leading to full server compromise including data exfiltration, persistence, or further lateral movement.
References include the vendor site at https://brainycp.io, a proof-of-concept exploit at https://www.exploit-db.com/exploits/51357, and a VulnCheck advisory at https://www.vulncheck.com/advisories/brainycp-remote-code-execution-via-authenticated-crontab-manipulation detailing the authenticated crontab manipulation vector. A public exploit on Exploit-DB indicates active interest from the security research community.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Authenticated OS command injection vulnerability in the remote web-based crontab interface of BrainyCP enables exploitation of public-facing applications/remote services (T1190/T1210), Unix shell execution (T1059.004), cron job abuse (T1053.003), and privilege escalation from low-priv credentials to full compromise (T1068).