MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks
Overview
Researchers from VulnCheck have identified a serious vulnerability in MetInfo, an open-source content management system. The flaw, designated as CVE-2026-29014, has a high severity score of 9.8 and allows for remote code execution through code injection. This issue affects MetInfo versions 7.9, 8.0, and 8.1, leaving users at risk of attackers executing arbitrary code on their servers without authentication. The vulnerability is currently being exploited in the wild, making it imperative for users of these versions to take immediate action. Failure to address this vulnerability could lead to unauthorized access and potential data breaches.
Key Takeaways
- Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
- Affected Systems: MetInfo CMS versions 7.9, 8.0, and 8.1
- Action Required: Users should update to the latest version of MetInfo that addresses this vulnerability.
- Timeline: Newly disclosed
Original Article Summary
Threat actors are actively exploiting a critical security flaw impacting an open-source content management system (CMS) known as MetInfo, according to new findings from VulnCheck. The vulnerability in question is CVE-2026-29014 (CVSS score: 9.8), a code injection flaw that could result in arbitrary code execution. "MetInfo CMS versions 7.9, 8.0, and 8.1 contain an unauthenticated PHP code
Impact
MetInfo CMS versions 7.9, 8.0, and 8.1
Exploitation Status
This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.
Timeline
Newly disclosed
Remediation
Users should update to the latest version of MetInfo that addresses this vulnerability. Additionally, implementing access controls and monitoring for unusual activities on the CMS can help mitigate risks until a patch is applied.
Additional Information
This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.
Related Topics: This incident relates to CVE, Vulnerability, Critical.