CVE-2026-32276: Arbitrary Code Execution in Connect-CMS Code Study Plugin
Vulnerability ID: CVE-2026-32276
CVSS Score: 8.8
Published: 2026-03-23
Connect-CMS contains a critical vulnerability in the Code Study Plugin (CWE-94: Improper Control of Generation of Code). The plugin fails to adequately sandbox or sanitize user-supplied PHP and Java code prior to execution. Authenticated attackers with access to the plugin can bypass blacklist-based filters using alternative whitespace or dynamic function calls, resulting in arbitrary remote code execution on the underlying server.
TL;DR
The Connect-CMS Code Study Plugin allows authenticated users to execute arbitrary PHP/Java code due to a flawed blacklist filter. Attackers can bypass the filter to achieve Remote Code Execution (RCE). The vendor remediated the issue in versions 1.41.1 and 2.41.1 by completely removing the vulnerable plugin.
⚠️ Exploit Status: POC
Technical Details
- Vulnerability Type: Improper Control of Generation of Code
- CWE ID: CWE-94
- CVSS Score: 8.8
- Attack Vector: Network
- Privileges Required: Low (Authenticated)
- Exploit Status: Proof of Concept
- Fix Approach: Complete removal of the vulnerable component
Affected Systems
- Connect-CMS Series 1.x <= 1.41.0
- Connect-CMS Series 2.x <= 2.41.0
-
Connect-CMS: <= 1.41.0 (Fixed in:
1.41.1) -
Connect-CMS: >= 2.0.0, <= 2.41.0 (Fixed in:
2.41.1)
Code Analysis
Commit: c0bcd07
Removal of the vulnerable Codestudies functionality.
Deleted CodestudiesPlugin.php, associated routing, and controller code.
Exploit Details
- Research Context: Proof of Concept demonstrating bypass of the runCheck filter using dynamic function invocation.
Mitigation Strategies
- Upgrade Connect-CMS to version 1.41.1 or 2.41.1.
- Manually delete the
CodestudiesPlugin.phpcomponent if upgrading is not possible. - Block access to the
/plugin/codestudies/*URI paths at the load balancer or WAF level.
Remediation Steps:
- Verify the current installed version of Connect-CMS.
- Download the official patch release corresponding to the major version branch (1.41.1 or 2.41.1).
- Deploy the update in a staging environment and verify the removal of the Code Study interface.
- Apply the update to the production environment.
- Review server logs for historical access to the
/plugin/codestudies/runendpoint to identify potential past exploitation.
References
Read the full report for CVE-2026-32276 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)