{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T12:36:04.686","vulnerabilities":[{"cve":{"id":"CVE-2026-21861","sourceIdentifier":"security-advisories@github.com","published":"2026-03-31T01:16:35.540","lastModified":"2026-04-01T20:29:39.303","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"baserCMS is a website development framework. Prior to version 5.2.3, baserCMS contains an OS command injection vulnerability in the core update functionality. An authenticated administrator can execute arbitrary OS commands on the server due to improper handling of user-controlled input that is directly passed to exec() without sufficient validation or escaping. This issue has been patched in version 5.2.3."},{"lang":"es","value":"baserCMS es un framework de desarrollo de sitios web. Antes de la versión 5.2.3, baserCMS contiene una vulnerabilidad de inyección de comandos del sistema operativo en la funcionalidad de actualización del núcleo. Un administrador autenticado puede ejecutar comandos arbitrarios del sistema operativo en el servidor debido a un manejo inadecuado de la entrada controlada por el usuario que se pasa directamente a exec() sin suficiente validación o escape. Este problema ha sido parcheado en la versión 5.2.3."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.3,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:basercms:basercms:*:*:*:*:*:*:*:*","versionEndExcluding":"5.2.3","matchCriteriaId":"07DEEEF3-0621-431D-8A38-405EDBD0957E"}]}]}],"references":[{"url":"https://basercms.net/security/JVN_20837860","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/baserproject/basercms/releases/tag/5.2.3","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/baserproject/basercms/security/advisories/GHSA-qxmc-6f24-g86g","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://github.com/baserproject/basercms/security/advisories/GHSA-qxmc-6f24-g86g","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Vendor Advisory"]}]}}]}