Traq versions 2.0 through 2.3 contain a remote code execution vulnerability in the admincp/common.php script. The flawed authorization logic fails to halt execution after a failed access check, allowing unauthenticated users to reach admin-only functionality. This can be exploited via plugins.php to inject and execute arbitrary PHP code.
History

Thu, 14 Aug 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 13 Aug 2025 21:00:00 +0000

Type Values Removed Values Added
Description Traq versions 2.0 through 2.3 contain a remote code execution vulnerability in the admincp/common.php script. The flawed authorization logic fails to halt execution after a failed access check, allowing unauthenticated users to reach admin-only functionality. This can be exploited via plugins.php to inject and execute arbitrary PHP code.
Title Traq 2.0–2.3 admincp/common.php RCE
Weaknesses CWE-306
CWE-94
References
Metrics cvssV4_0

{'score': 10, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-08-13T20:54:16.949Z

Updated: 2025-08-14T14:51:52.391Z

Reserved: 2025-08-12T20:15:19.040Z

Link: CVE-2011-10013

cve-icon Vulnrichment

Updated: 2025-08-14T13:44:50.620Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-13T21:15:28.607

Modified: 2025-08-14T13:11:53.633

Link: CVE-2011-10013

cve-icon Redhat

No data.