Cyber Posture

CVE-2026-34965

HighPublic PoC

Published: 29 April 2026

Published
29 April 2026
Modified
29 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0043 62.7th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Cockpit CMS contains an authenticated remote code execution vulnerability in the /cockpit/collections/save_collection endpoint that allows authenticated attackers with collection management privileges to inject arbitrary PHP code into collection rules parameters. Attackers can inject malicious PHP code through rule parameters which…

more

is written directly to server-side PHP files and executed via include() to achieve arbitrary command execution on the underlying server.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces validation of rule parameters in the /cockpit/collections/save_collection endpoint to block injection of arbitrary PHP code before it is written to server-side files.

prevent

Directly remediates the flaw in Cockpit CMS by applying patches or updates that prevent PHP code injection and execution via collection rules.

prevent

Applies least privilege to minimize users with collection management privileges needed to access and exploit the vulnerable endpoint.

Security SummaryAI

CVE-2026-34965 is an authenticated remote code execution vulnerability (CWE-94) in Cockpit CMS, specifically within the /cockpit/collections/save_collection endpoint. Published on 2026-04-29, it enables attackers to inject arbitrary PHP code into collection rules parameters. The injected code is written directly to server-side PHP files and subsequently executed via include(), resulting in arbitrary command execution on the underlying server. The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

Attackers require valid authentication and collection management privileges to exploit this issue over the network with low complexity and no user interaction. By crafting a request to the vulnerable endpoint with malicious PHP in rule parameters, they can persist and trigger code execution, gaining high-impact control over confidentiality, integrity, and availability on the server.

Advisories and patches are documented in references including VulnCheck's advisory at https://www.vulncheck.com/advisories/cockpit-cms-authenticated-remote-code-execution-via-collections, a detailed analysis at https://gist.github.com/thepiyushkumarshukla/64d2318518b17f529bc3ccb11fd5be90, the Cockpit GitHub repository at https://github.com/agentejo/cockpit, and a related commit at https://github.com/agentejo/cockpit/commits/494765e4f0fb9484f320aee0c6ee889b6fa789b9.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

Insufficient information to map techniques.
Confidence: LOW · MITRE ATT&CK Enterprise v19.0

References