CVE-2026-32276
Published: 23 March 2026
Summary
CVE-2026-32276 is a high-severity Code Injection (CWE-94) vulnerability in Opensource-Workshop Connect-Cms. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 25.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires timely identification, reporting, and correction of software flaws like this code injection vulnerability through patching to versions 1.41.1 or 2.41.1.
Mandates validation of untrusted inputs to the Code Study Plugin to block code injection exploits (CWE-94) by authenticated users.
Enables vulnerability scanning to identify the presence of CVE-2026-32276 in deployed Connect-CMS instances for prioritized remediation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote authenticated code injection (CWE-94) in public-facing CMS plugin directly enables T1190 for initial server access, T1059 for arbitrary code/command execution, and T1068 for low-to-high privilege escalation resulting in full system compromise.
NVD Description
Connect-CMS is a content management system. In versions on the 1.x series up to and including 1.41.0 and versions on the 2.x series up to and including 2.41.0, an authenticated user may be able to execute arbitrary code in the…
more
Code Study Plugin. Versions 1.41.1 and 2.41.1 contain a patch.
Deeper analysisAI
Connect-CMS, an open-source content management system, is affected by CVE-2026-32276, a code injection vulnerability (CWE-94) in its Code Study Plugin. The flaw impacts versions in the 1.x series up to and including 1.41.0 and the 2.x series up to and including 2.41.0. It has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to potential for complete system compromise.
An authenticated user with low privileges can exploit this vulnerability remotely over the network with low complexity and no user interaction required. Successful exploitation allows arbitrary code execution on the server, granting high confidentiality, integrity, and availability impacts, such as full control over the affected Connect-CMS instance.
Mitigation is available via patched versions 1.41.1 and 2.41.1, as detailed in the project's GitHub security advisory (GHSA-hxqw-6qv7-cqfv) and release notes. The fixing commit (c0bcd07fc1e9375941aa1295d044328ecd44ed85) addresses the issue in the Code Study Plugin, and administrators should upgrade immediately to eliminate the risk.
Details
- CWE(s)