TextPattern CMS 4.9.0-dev contains a remote code...
High severity
Unreviewed
Published
May 16, 2026
to the GitHub Advisory Database
•
Updated May 16, 2026
Description
Published by the National Vulnerability Database
May 16, 2026
Published to the GitHub Advisory Database
May 16, 2026
Last updated
May 16, 2026
TextPattern CMS 4.9.0-dev contains a remote code execution vulnerability that allows authenticated attackers to upload arbitrary PHP files by exploiting the plugin upload functionality. Attackers can authenticate, retrieve a CSRF token from the plugin event page, and upload malicious PHP files to the textpattern/tmp/ directory for code execution.
References