Traq versions 2.0 through 2.3 contain a remote code execution vulnerability in the admincp/common.php script. The flawed authorization logic fails to halt execution after a failed access check, allowing unauthenticated users to reach admin-only functionality. This can be exploited via plugins.php to inject and execute arbitrary PHP code.
Metrics
Affected Vendors & Products
References
History
Thu, 14 Aug 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 13 Aug 2025 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Traq versions 2.0 through 2.3 contain a remote code execution vulnerability in the admincp/common.php script. The flawed authorization logic fails to halt execution after a failed access check, allowing unauthenticated users to reach admin-only functionality. This can be exploited via plugins.php to inject and execute arbitrary PHP code. | |
Title | Traq 2.0–2.3 admincp/common.php RCE | |
Weaknesses | CWE-306 CWE-94 |
|
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-08-13T20:54:16.949Z
Updated: 2025-08-14T14:51:52.391Z
Reserved: 2025-08-12T20:15:19.040Z
Link: CVE-2011-10013

Updated: 2025-08-14T13:44:50.620Z

Status : Awaiting Analysis
Published: 2025-08-13T21:15:28.607
Modified: 2025-08-14T13:11:53.633
Link: CVE-2011-10013

No data.