CVE-2026-28507
Published: 06 March 2026
Summary
CVE-2026-28507 is a high-severity OS Command Injection (CWE-78) vulnerability in Withknown Known. Its CVSS base score is 7.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 30.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
RCE via OS command injection (CWE-78) and path traversal/file write in a web publishing platform directly enables exploitation of public-facing apps for initial or post-auth access, Unix shell command execution, and privilege escalation from app admin to OS-level code execution.
NVD Description
Idno is a social publishing platform. Prior to version 1.6.4, there is a remote code execution vulnerability via chained import file write and template path traversal. This issue has been patched in version 1.6.4.
Deeper analysisAI
CVE-2026-28507 is a remote code execution vulnerability in Idno, an open-source social publishing platform. Versions prior to 1.6.4 are affected due to chained import file write and template path traversal issues, mapped to CWE-78 (OS Command Injection). The vulnerability received a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) and was published on 2026-03-06.
High-privilege users (PR:H), such as administrators, can exploit this remotely over the network (AV:N) with low attack complexity (AC:L) and no user interaction required (UI:N). Successful exploitation allows attackers to achieve high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H) within the target's scope (S:U), enabling arbitrary remote code execution on the server.
The issue has been patched in Idno version 1.6.4. Administrators should upgrade to this version or later to mitigate the vulnerability. Additional details are available in the GitHub security advisory at https://github.com/idno/idno/security/advisories/GHSA-37j7-56xc-c468 and release notes at https://github.com/idno/idno/releases/tag/1.6.4.
Details
- CWE(s)