Skip to content

Commit 92109c1

Browse files
1 parent c88d94f commit 92109c1

3 files changed

Lines changed: 576 additions & 0 deletions

File tree

Lines changed: 96 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,96 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-2762-657x-v979",
4+
"modified": "2026-01-21T01:04:32Z",
5+
"published": "2026-01-21T01:04:32Z",
6+
"aliases": [
7+
"CVE-2026-23885"
8+
],
9+
"summary": "AlchemyCMS: Authenticated Remote Code Execution (RCE) via eval injection in ResourcesHelper",
10+
"details": "### Summary\nA vulnerability was discovered during a manual security audit of the AlchemyCMS source code. The application uses the Ruby `eval()` function to dynamically execute a string provided by the `resource_handler.engine_name` attribute in `Alchemy::ResourcesHelper#resource_url_proxy`.\n\n### Details\nThe vulnerability exists in `app/helpers/alchemy/resources_helper.rb` at line 28. The code explicitly bypasses security linting with `# rubocop:disable Security/Eval`, indicating that the use of a dangerous function was known but not properly mitigated. \n\nSince `engine_name` is sourced from module definitions that can be influenced by administrative configurations, it allows an authenticated attacker to escape the Ruby sandbox and execute arbitrary system commands on the host OS.\n\nBut, for this attack to be possible local file access to the alchemy project or the source on a remote server is necessary in order to manipulate the module config file, though.\n\n### PoC (Proof of Concept)\nThe following standalone Ruby script demonstrates that the `eval` sink is directly exploitable:\n\n```ruby\nrequire 'ostruct'\n\ndef resource_url_proxy(resource_handler)\n if resource_handler.engine_name && !resource_handler.engine_name.empty?\n eval(resource_handler.engine_name)\n end\nend\n\n# Payload to create a file in /tmp directory\npayload = \"system('touch /tmp/alchemy_rce_verified'); 'main_app'\"\nhandler = OpenStruct.new(engine_name: payload)\n\nresource_url_proxy(handler)\n\nif File.exist?('/tmp/alchemy_rce_verified')\n puts \"RCE Verified: Command executed successfully.\"\nend\n```\n\n\n<img width=\"1909\" height=\"885\" alt=\"Screenshot From 2026-01-17 15-49-01\" src=\"https://github.com/user-attachments/assets/07929d46-c839-4d3c-9b74-916bd87819ad\" />",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "RubyGems",
21+
"name": "alchemy_cms"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "7.4.12"
32+
}
33+
]
34+
}
35+
]
36+
},
37+
{
38+
"package": {
39+
"ecosystem": "RubyGems",
40+
"name": "alchemy_cms"
41+
},
42+
"ranges": [
43+
{
44+
"type": "ECOSYSTEM",
45+
"events": [
46+
{
47+
"introduced": "8.0.0.a"
48+
},
49+
{
50+
"fixed": "8.0.3"
51+
}
52+
]
53+
}
54+
]
55+
}
56+
],
57+
"references": [
58+
{
59+
"type": "WEB",
60+
"url": "https://github.com/AlchemyCMS/alchemy_cms/security/advisories/GHSA-2762-657x-v979"
61+
},
62+
{
63+
"type": "ADVISORY",
64+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23885"
65+
},
66+
{
67+
"type": "WEB",
68+
"url": "https://github.com/AlchemyCMS/alchemy_cms/commit/55d03ec600fd9e07faae1138b923790028917d26"
69+
},
70+
{
71+
"type": "WEB",
72+
"url": "https://github.com/AlchemyCMS/alchemy_cms/commit/563c4ce45bf5813b7823bf3403ca1fc32cb769e7"
73+
},
74+
{
75+
"type": "PACKAGE",
76+
"url": "https://github.com/AlchemyCMS/alchemy_cms"
77+
},
78+
{
79+
"type": "WEB",
80+
"url": "https://github.com/AlchemyCMS/alchemy_cms/releases/tag/v7.4.12"
81+
},
82+
{
83+
"type": "WEB",
84+
"url": "https://github.com/AlchemyCMS/alchemy_cms/releases/tag/v8.0.3"
85+
}
86+
],
87+
"database_specific": {
88+
"cwe_ids": [
89+
"CWE-95"
90+
],
91+
"severity": "CRITICAL",
92+
"github_reviewed": true,
93+
"github_reviewed_at": "2026-01-21T01:04:32Z",
94+
"nvd_published_at": "2026-01-19T22:16:02Z"
95+
}
96+
}

0 commit comments

Comments
 (0)