
Cloud Vulnerability DB
A community-led vulnerabilities database
Funadmin v3.2.0 contains a remote code execution (RCE) vulnerability via the component \controller\Addon.php. The vulnerability was discovered and disclosed in March 2023, affecting the background offline plugin installation functionality of the Funadmin content management system (NVD, GitHub Issue).
The vulnerability exists in the plugin installation mechanism within the app\backend\controller\Addon.php file. The system fails to properly filter malicious code during the plugin installation process, allowing attackers to construct and upload malicious plugin controllers. An example attack vector involves creating a specially crafted tarball containing malicious code in the snowflake\controller\Index.php file (GitHub Issue).
A successful exploitation of this vulnerability allows attackers to execute arbitrary code on the affected system, potentially leading to complete system compromise. The vulnerability enables attackers to execute commands with the same privileges as the web server process (NVD).
Users should upgrade from version 3.2.0 to a patched version of Funadmin. If immediate upgrading is not possible, it is recommended to disable the plugin installation functionality until the update can be applied (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."