Cyber Posture

CVE-2026-27179

HighPublic PoC

Published: 18 February 2026

Published
18 February 2026
Modified
20 February 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0004 13.8th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-27179 is a high-severity SQL Injection (CWE-89) vulnerability in Mjdm Majordomo. Its CVSS base score is 8.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 13.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation of the unsanitized $_GET['parent'] parameter to prevent its interpolation into SQL queries, comprehensively addressing the SQL injection vulnerability.

prevent

Mandates identification, reporting, and correction of the specific unauthenticated SQL injection flaw in commands_search.inc.php, enabling patching as referenced in advisories.

prevent

Limits permitted actions without authentication, such as loading the vulnerable commands module via /objects/?module=commands, reducing unauthenticated exploitation opportunities.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

Unauthenticated SQL injection in publicly reachable web module (T1190) directly enables extraction of arbitrary data including credentials from the backend database (T1213.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

MajorDoMo (aka Major Domestic Module) contains an unauthenticated SQL injection vulnerability in the commands module. The commands_search.inc.php file directly interpolates the $_GET['parent'] parameter into multiple SQL queries without sanitization or parameterized queries. The commands module is loadable without authentication via…

more

the /objects/?module=commands endpoint, which includes arbitrary modules by name and calls their usual() method. Time-based blind SQL injection is exploitable using UNION SELECT SLEEP() syntax. Because MajorDoMo stores admin passwords as unsalted MD5 hashes in the users table, successful exploitation enables extraction of credentials and subsequent admin panel access.

Deeper analysisAI

CVE-2026-27179 is an unauthenticated SQL injection vulnerability in MajorDoMo (also known as Major Domestic Module), specifically within the commands module. The issue stems from the commands_search.inc.php file, which directly interpolates the $_GET['parent'] parameter into multiple SQL queries without sanitization or parameterized queries. The commands module is loadable without authentication via the /objects/?module=commands endpoint, which includes arbitrary modules by name and calls their usual() method. Published on 2026-02-18, the vulnerability carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N) and maps to CWE-89.

Attackers with network access can exploit this as unauthenticated users through time-based blind SQL injection, such as via UNION SELECT SLEEP() syntax. Successful exploitation allows extraction of data from the database, including admin passwords stored as unsalted MD5 hashes in the users table. This enables attackers to obtain credentials and gain subsequent access to the admin panel.

Advisories and patches addressing mitigation are detailed in VulnCheck's advisory at https://www.vulncheck.com/advisories/majordomo-unauthenticated-sql-injection-in-commands-module, a GitHub pull request at https://github.com/sergejey/majordomo/pull/1177, and analysis at https://chocapikk.com/posts/2026/majordomo-revisited/. Security practitioners should consult these resources for patch deployment and hardening recommendations.

Details

CWE(s)

Affected Products

mjdm
majordomo
all versions

CVEs Like This One

CVE-2026-27174Same product: Mjdm Majordomo
CVE-2026-27180Same product: Mjdm Majordomo
CVE-2026-27181Same product: Mjdm Majordomo
CVE-2026-27175Same product: Mjdm Majordomo
CVE-2026-27177Same product: Mjdm Majordomo
CVE-2026-27178Same product: Mjdm Majordomo
CVE-2026-23492Shared CWE-89
CVE-2019-25541Shared CWE-89
CVE-2025-25116Shared CWE-89
CVE-2025-52025Shared CWE-89

References