<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-21861 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-21861/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 31 Mar 2026 01:19:59 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-21861/feed.xml" rel="self" type="application/rss+xml"/><item><title>baserCMS OS Command Injection Vulnerability (CVE-2026-21861)</title><link>https://feed.craftedsignal.io/briefs/2026-04-basercms-command-injection/</link><pubDate>Tue, 31 Mar 2026 01:19:59 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-basercms-command-injection/</guid><description>baserCMS versions prior to 5.2.3 are vulnerable to OS command injection, allowing an authenticated administrator to execute arbitrary commands on the server via maliciously crafted input to the core update functionality.</description><content:encoded>&lt;p>baserCMS, a website development framework, is susceptible to an OS command injection vulnerability (CVE-2026-21861) in versions prior to 5.2.3. This flaw resides within the core update functionality, where user-controlled input is directly passed to the &lt;code>exec()&lt;/code> function without proper sanitization or validation. A successful exploit allows an authenticated administrator to execute arbitrary operating system commands on the underlying server. The vulnerability was reported on March 30, 2026…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-21861</category><category>command-injection</category><category>webserver</category></item></channel></rss>