
Cloud Vulnerability DB
A community-led vulnerabilities database
Codiad Web IDE through version 2.8.4 contains a PHP Code injection vulnerability (CVE-2019-19208). The vulnerability was discovered in March 2020 and affects all versions up to and including 2.8.4. This security issue allows attackers to perform remote code execution on affected systems (NVD, USD HeroLab).
The vulnerability allows an unauthenticated attacker to inject PHP code before the initial configuration that gets executed on the server. The issue is related to improper control of code generation (CWE-94). The vulnerability has received a CVSS v3.1 base score of 9.8 (CRITICAL) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating high severity with network access vector and no required privileges or user interaction (NVD).
The successful exploitation of this vulnerability allows attackers to execute arbitrary system commands on the affected server, potentially leading to complete system compromise. The attacker can gain unauthorized access to sensitive data, modify system configurations, and potentially establish persistent access to the compromised system (USD HeroLab).
The vendor has not released an official fix for this vulnerability. As a general mitigation strategy, organizations should properly filter input that is written to PHP files and implement strong access controls. It is recommended to upgrade to a newer version of the software if available or consider alternative web IDE solutions (USD HeroLab).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."