Cyber Posture

CVE-2026-28507

HighPublic PoCRCE

Published: 06 March 2026

Published
06 March 2026
Modified
16 March 2026
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0062 70.0th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-28507 is a high-severity OS Command Injection (CWE-78) vulnerability in Withknown Known. Its CVSS base score is 7.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 30.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-78

Platform-independent apps typically execute inside a managed runtime or sandbox that restricts direct OS command execution, reducing the ability to exploit OS command injection.

addresses: CWE-78

Validates inputs to block special elements that would alter OS command execution.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

RCE via OS command injection (CWE-78) and path traversal/file write in a web publishing platform directly enables exploitation of public-facing apps for initial or post-auth access, Unix shell command execution, and privilege escalation from app admin to OS-level code execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Idno is a social publishing platform. Prior to version 1.6.4, there is a remote code execution vulnerability via chained import file write and template path traversal. This issue has been patched in version 1.6.4.

Deeper analysisAI

CVE-2026-28507 is a remote code execution vulnerability in Idno, an open-source social publishing platform. Versions prior to 1.6.4 are affected due to chained import file write and template path traversal issues, mapped to CWE-78 (OS Command Injection). The vulnerability received a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) and was published on 2026-03-06.

High-privilege users (PR:H), such as administrators, can exploit this remotely over the network (AV:N) with low attack complexity (AC:L) and no user interaction required (UI:N). Successful exploitation allows attackers to achieve high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H) within the target's scope (S:U), enabling arbitrary remote code execution on the server.

The issue has been patched in Idno version 1.6.4. Administrators should upgrade to this version or later to mitigate the vulnerability. Additional details are available in the GitHub security advisory at https://github.com/idno/idno/security/advisories/GHSA-37j7-56xc-c468 and release notes at https://github.com/idno/idno/releases/tag/1.6.4.

Details

CWE(s)

Affected Products

withknown
known
≤ 1.6.4

CVEs Like This One

CVE-2026-28508Same product: Withknown Known
CVE-2026-27635Shared CWE-78
CVE-2020-36910Shared CWE-78
CVE-2026-31019Shared CWE-78
CVE-2026-32298Shared CWE-78
CVE-2025-20029Shared CWE-78
CVE-2025-60957Shared CWE-78
CVE-2026-28773Shared CWE-78
CVE-2026-24506Shared CWE-78
CVE-2025-56082Shared CWE-78

References