No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sun, 17 May 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw has been found in Sanluan PublicCMS 5.202506.d. The impacted element is the function execute of the file publiccms-core/src/main/java/com/publiccms/views/directive/tools/TemplateResultDirective.java of the component templateResult API. This manipulation of the argument templateContent causes improper neutralization of special elements used in a template engine. The attack is possible to be carried out remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | Sanluan PublicCMS templateResult API TemplateResultDirective.java execute special elements used in a template engine | |
| First Time appeared |
Publiccms
Publiccms publiccms |
|
| Weaknesses | CWE-1336 CWE-791 |
|
| CPEs | cpe:2.3:a:publiccms:publiccms:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Publiccms
Publiccms publiccms |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-17T08:00:12.437Z
Reserved: 2026-05-16T10:36:30.744Z
Link: CVE-2026-8740
No data.
Status : Received
Published: 2026-05-17T09:16:34.823
Modified: 2026-05-17T09:16:34.823
Link: CVE-2026-8740
No data.
OpenCVE Enrichment
No data.