OpenCATS PHP Code Injection Vulnerability (CVE-2026-27760)
Unauthenticated attackers can exploit a PHP code injection vulnerability in OpenCATS versions prior to commit 3002a29 by injecting malicious PHP code into the installer's AJAX endpoint, leading to arbitrary code execution.
CVE-2026-27760 is a critical PHP code injection vulnerability that affects OpenCATS, a web-based applicant tracking system, in versions prior to commit 3002a29. The vulnerability resides in the installer AJAX endpoint, specifically within the databaseConnectivity action parameter. Unauthenticated attackers can exploit this flaw by injecting arbitrary PHP code into this parameter. This injected code allows attackers to execute arbitrary commands on the server. The vulnerability is triggered during the initial setup phase, when the installation wizard is not yet complete and continues to execute on every subsequent page load. This vulnerability poses a significant risk to organizations using vulnerable versions of OpenCATS, as it can lead to complete system compromise, data theft, or denial of service.
Attack Chain
- An unauthenticated attacker sends a crafted HTTP POST request to the OpenCATS installer AJAX endpoint (
/install/ajax.php). - The request includes the
databaseConnectivityaction parameter. - The attacker injects PHP code into the
databaseConnectivityparameter, breaking out of thedefine()string context inconfig.phpwith a single quote and statement separator. - The injected code is then processed by the server, leading to arbitrary PHP code execution within the context of the web server user.
- The injected code persists because it’s written to the
config.phpfile. - Every subsequent page load executes the injected PHP code, even after the initial malicious request.
- The attacker can use the code execution to install a web shell for persistent access.
- With the web shell, the attacker can perform various malicious activities, including reading sensitive files, modifying the database, or pivoting to other systems on the network.
Impact
Successful exploitation of CVE-2026-27760 allows unauthenticated attackers to execute arbitrary PHP code on the affected OpenCATS server. This can lead to complete system compromise, including the theft of sensitive applicant data, modification of application settings, and the installation of backdoors for persistent access. Given that OpenCATS handles applicant data, a successful attack could result in a significant data breach and reputational damage. The vulnerability exists in the installer and persists throughout subsequent page loads as long as the installation wizard remains incomplete, making it highly impactful.
Recommendation
- Upgrade OpenCATS to a version containing commit 3002a29 or later to remediate CVE-2026-27760.
- Monitor web server logs for suspicious POST requests to
/install/ajax.phpcontaining PHP code in thedatabaseConnectivityparameter to detect exploitation attempts (see rule: “Detect OpenCATS installer code injection attempt”). - Implement a Web Application Firewall (WAF) rule to block requests containing PHP code in the
databaseConnectivityparameter. - Review and restrict access to the
/install/directory after completing the installation process to prevent accidental or malicious access to the installer.
Detection coverage 2
Detect OpenCATS installer code injection attempt
criticalDetects attempts to inject PHP code into the OpenCATS installer's databaseConnectivity parameter.
Detect persistent PHP code execution via config.php modification
criticalDetects modifications to config.php containing injected PHP code.
Detection queries are kept inside the platform. Get full rules →