Description
A weakness has been identified in Pagekit CMS up to 1.0.18. This issue affects the function evaluate of the file app/modules/view/src/PhpEngine.php of the component StringStorage Template Handler. This manipulation causes improper neutralization of directives in dynamically evaluated code. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Problem types
Improper Neutralization of Directives in Dynamically Evaluated Code
Product status
1.0.1
1.0.2
1.0.3
1.0.4
1.0.5
1.0.6
1.0.7
1.0.8
1.0.9
1.0.10
1.0.11
1.0.12
1.0.13
1.0.14
1.0.15
1.0.16
1.0.17
1.0.18
Timeline
| 2026-04-20: | Advisory disclosed |
| 2026-04-20: | VulDB entry created |
| 2026-04-20: | VulDB entry last update |
Credits
s4nnty (VulDB User)
VulDB CNA Team
References
vuldb.com/vuln/358286 (VDB-358286 | Pagekit CMS StringStorage Template PhpEngine.php evaluate eval injection)
vuldb.com/vuln/358286/cti (VDB-358286 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/submit/794186 (Submit #794186 | Pagekit CMS framework <= 1.0.18 Remote Code Execution)
medium.com/@pkhuyar/the-danger-of-php-eval-a23410187ca2
