Cyber Posture

CVE-2026-30694

CriticalPublic PoCRCE

Published: 19 March 2026

Published
19 March 2026
Modified
25 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0041 61.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-30694 is a critical-severity Code Injection (CWE-94) vulnerability in Dedecms Dedecms. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 38.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires timely patching and remediation of the code injection flaw in DedeCMS array_filter component to eliminate arbitrary code execution risk.

prevent

Enforces input validation at the vulnerable array_filter entry point to reject malicious payloads that enable code injection.

detect

Provides vulnerability scanning to identify the presence of CVE-2026-30694 in DedeCMS installations, enabling proactive remediation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

CVE-2026-30694 is a critical remote code execution vulnerability in a public-facing web application (DedeCMS), directly enabling exploitation of public-facing applications for initial access.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

An issue in DedeCMS v.5.7.118 and before allows a remote attacker to execute arbitrary code via the array_filter component

Deeper analysisAI

CVE-2026-30694 is a code injection vulnerability (CWE-94) affecting DedeCMS versions 5.7.118 and earlier, specifically in the array_filter component. Published on 2026-03-19, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for remote arbitrary code execution.

Any unauthenticated remote attacker can exploit this vulnerability over the network with low attack complexity and no user interaction required. Successful exploitation allows the attacker to achieve high-impact effects on confidentiality, integrity, and availability, potentially leading to full compromise of the affected DedeCMS instance through execution of arbitrary code.

Advisories and further details on exploitation or mitigation are documented in references including https://jacobjacobjacob.gitbook.io/cve-2026-30694/ and https://leixyous-personal-organization.gitbook.io/dedecms-file-manage-getshell-via-bypass-blacklist/.

Details

CWE(s)

Affected Products

dedecms
dedecms
≤ 5.7.118

CVEs Like This One

CVE-2026-30643Same product: Dedecms Dedecms
CVE-2026-29839Same product: Dedecms Dedecms
CVE-2024-57241Same product: Dedecms Dedecms
CVE-2026-35178Shared CWE-94
CVE-2024-1490Shared CWE-94
CVE-2024-7419Shared CWE-94
CVE-2025-46581Shared CWE-94
CVE-2025-65037Shared CWE-94
CVE-2025-10679Shared CWE-94
CVE-2024-57401Shared CWE-94

References