JustAppSec
Back to news

Unauthenticated RCE disclosed in Pegasus CMS extra_fields plugin

2 min readPublished 05 Apr 2026Updated 05 Apr 2026Source: CVEProject (cvelistV5)

TL;DR — Pegasus CMS’s extra_fields.php plugin can be abused for unauthenticated remote code execution by sending a crafted POST to submit.php that triggers unsafe eval behavior.

What happened

Pegasus CMS is a PHP-based content management system. A newly published CVE record (CVE-2019-25687) describes a Critical unauthenticated remote code execution issue in Pegasus CMS 1.0, attributed to unsafe eval functionality in the extra_fields.php plugin.

Per the CVE description, an attacker can send POST requests to the submit.php endpoint with malicious PHP code in the action parameter, resulting in arbitrary command execution and an interactive shell. The CVE references a public Exploit-DB entry, meaning exploitation can be straightforward for attackers targeting exposed installs.

Although the underlying public disclosure is dated (the CVE record lists datePublic as 2019-03-14), the CVE publication on 2026-04-05 matters operationally because it drives SCA/SBOM feeds, vulnerability management workflows, and “newly detected” alerts for legacy CMS deployments that may have been missed.

Who is impacted

  • Deployments running Pegasus CMS version 1.0.
  • Internet-exposed or otherwise untrusted-network-reachable Pegasus CMS instances.
ItemSource value
Affected versions1.0
Patched versionsNot stated in the CVE record
Attack preconditionUnauthenticated (PR:N)
SeverityCVSS v4.0 9.3 (Critical); CVSS v3.1 9.8 (Critical)
Public exploit referenceYes (ExploitDB-46542)

What to do now

  • Follow vendor remediation guidance (the CVE record does not list a fixed version; validate your deployment’s upstream patch status before assuming you are covered).
  • Inventory your environment for Pegasus CMS (web roots, containers, SBOM/SCA results) and identify any instances matching the affected product/version.
  • Reduce exposure until you can confirm remediation:
    • Remove public access to the CMS (network ACLs, VPN-only admin access) or place it behind an authenticated gateway.
    • Add monitoring/detections for suspicious POST traffic to submit.php, especially requests that appear to manipulate an action parameter.
  • If compromise is suspected, treat as an RCE-class incident:
    • Preserve webserver/PHP-FPM logs and review for webshell creation or unexpected process execution.
    • Rotate credentials and secrets reachable by the CMS runtime (database passwords, SMTP creds, API keys).

Content is AI-assisted and reviewed by our team, but issues may be missed and best practices evolve rapidly, send corrections to [email protected]. Always consult official documentation and validate key implementation decisions before making design or security choices.

Need help?Get in touch.