MajorDoMo (aka Major Domestic Module) allows unauthenticated remote code execution via the admin panel's PHP console feature. An include order bug in modules/panel.class.php causes execution to continue past a redirect() call that lacks an exit statement, allowing unauthenticated requests to reach the ajax handler in inc_panel_ajax.php. The console handler within that file passes user-supplied input from GET parameters (via register_globals) directly to eval() without any authentication check. An attacker can execute arbitrary PHP code by sending a crafted GET request to /admin.php with ajax_panel, op, and command parameters.
Project Subscriptions
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 20 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mjdm
Mjdm majordomo |
|
| CPEs | cpe:2.3:a:mjdm:majordomo:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Mjdm
Mjdm majordomo |
Wed, 18 Feb 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | MajorDoMo (aka Major Domestic Module) allows unauthenticated remote code execution via the admin panel's PHP console feature. An include order bug in modules/panel.class.php causes execution to continue past a redirect() call that lacks an exit statement, allowing unauthenticated requests to reach the ajax handler in inc_panel_ajax.php. The console handler within that file passes user-supplied input from GET parameters (via register_globals) directly to eval() without any authentication check. An attacker can execute arbitrary PHP code by sending a crafted GET request to /admin.php with ajax_panel, op, and command parameters. | |
| Title | MajorDoMo Unauthenticated Remote Code Execution via Admin Console Eval | |
| First Time appeared |
Sergejey
Sergejey majordomo |
|
| Weaknesses | CWE-94 | |
| CPEs | cpe:2.3:a:sergejey:majordomo:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Sergejey
Sergejey majordomo |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-18T21:10:36.113Z
Reserved: 2026-02-18T15:22:30.052Z
Link: CVE-2026-27174
No data.
Status : Analyzed
Published: 2026-02-18T22:16:25.080
Modified: 2026-02-20T20:02:36.767
Link: CVE-2026-27174
No data.
OpenCVE Enrichment
Updated: 2026-02-19T10:11:05Z
Weaknesses