Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 20 Feb 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mjdm
Mjdm majordomo |
|
| CPEs | cpe:2.3:a:mjdm:majordomo:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Mjdm
Mjdm majordomo |
Fri, 20 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 18 Feb 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | MajorDoMo (aka Major Domestic Module) contains an unauthenticated SQL injection vulnerability in the commands module. The commands_search.inc.php file directly interpolates the $_GET['parent'] parameter into multiple SQL queries without sanitization or parameterized queries. The commands module is loadable without authentication via the /objects/?module=commands endpoint, which includes arbitrary modules by name and calls their usual() method. Time-based blind SQL injection is exploitable using UNION SELECT SLEEP() syntax. Because MajorDoMo stores admin passwords as unsalted MD5 hashes in the users table, successful exploitation enables extraction of credentials and subsequent admin panel access. | |
| Title | MajorDoMo Unauthenticated SQL Injection in Commands Module | |
| First Time appeared |
Sergejey
Sergejey majordomo |
|
| Weaknesses | CWE-89 | |
| CPEs | cpe:2.3:a:sergejey:majordomo:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Sergejey
Sergejey majordomo |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-20T19:01:28.949Z
Reserved: 2026-02-18T15:22:30.053Z
Link: CVE-2026-27179
Updated: 2026-02-20T19:01:21.372Z
Status : Analyzed
Published: 2026-02-18T22:16:25.967
Modified: 2026-02-20T19:56:55.863
Link: CVE-2026-27179
No data.
OpenCVE Enrichment
Updated: 2026-02-19T10:11:00Z