CVE-2026-23885 (CNNVD-202601-2979)

MEDIUM
中文标题:
AlchemyCMS 安全漏洞
英文标题:
AlchemyCMS has Authenticated Remote Code Execution (RCE) via eval injection in ResourcesHelper
CVSS分数: 6.6
发布时间: 2026-01-19 21:09:06
漏洞类型: 其他
状态: PUBLISHED
数据质量分数: 0.40
数据版本: v3
漏洞描述
中文描述:

AlchemyCMS是AlchemyCMS - A Rails CMS Framework开源的一个内容管理系统。 AlchemyCMS 7.4.12之前版本和8.0.3之前版本存在安全漏洞,该漏洞源于在Alchemy::ResourcesHelper#resource_url_proxy中使用Ruby eval函数动态执行由resource_handler.engine_name属性提供的字符串,可能导致经过身份验证的攻击者逃逸Ruby沙箱并在主机操作系统上执行任意系统命令。

英文描述:

Alchemy is an open source content management system engine written in Ruby on Rails. Prior to versions 7.4.12 and 8.0.3, the application uses the Ruby `eval()` function to dynamically execute a string provided by the `resource_handler.engine_name` attribute in `Alchemy::ResourcesHelper#resource_url_proxy`. The vulnerability exists in `app/helpers/alchemy/resources_helper.rb` at line 28. The code explicitly bypasses security linting with `# rubocop:disable Security/Eval`, indicating that the use of a dangerous function was known but not properly mitigated. Since `engine_name` is sourced from module definitions that can be influenced by administrative configurations, it allows an authenticated attacker to escape the Ruby sandbox and execute arbitrary system commands on the host OS. Versions 7.4.12 and 8.0.3 fix the issue by replacing `eval()` with `send()`.

CWE类型:
CWE-95
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
AlchemyCMS alchemy_cms < 7.4.12 - - cpe:2.3:a:alchemycms:alchemy_cms:<_7.4.12:*:*:*:*:*:*:*
AlchemyCMS alchemy_cms >= 8.0.0, < 8.0.3 - - cpe:2.3:a:alchemycms:alchemy_cms:>=_8.0.0,_<_8.0.3:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
https://github.com/AlchemyCMS/alchemy_cms/security/advisories/GHSA-2762-657x-v979 x_refsource_CONFIRM
cve.org
访问
https://github.com/AlchemyCMS/alchemy_cms/commit/55d03ec600fd9e07faae1138b923790028917d26 x_refsource_MISC
cve.org
访问
https://github.com/AlchemyCMS/alchemy_cms/commit/563c4ce45bf5813b7823bf3403ca1fc32cb769e7 x_refsource_MISC
cve.org
访问
https://github.com/AlchemyCMS/alchemy_cms/releases/tag/v7.4.12 x_refsource_MISC
cve.org
访问
https://github.com/AlchemyCMS/alchemy_cms/releases/tag/v8.0.3 x_refsource_MISC
cve.org
访问
CVSS评分详情
3.1 (cna)
MEDIUM
6.6
CVSS向量: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
机密性
HIGH
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2026-01-19 21:09:06
修改时间:
2026-01-19 21:09:06
创建时间:
2026-01-20 03:10:36
更新时间:
2026-01-27 06:00:17
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2026-23885 2026-01-20 02:19:58 2026-01-19 19:10:36
NVD nvd_CVE-2026-23885 2026-01-20 03:00:05 2026-01-19 19:10:38
CNNVD cnnvd_CNNVD-202601-2979 2026-01-26 02:10:03 2026-01-25 18:11:52
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2026-01-26 02:11:52
vulnerability_type: 未提取 → 其他; cnnvd_id: 未提取 → CNNVD-202601-2979; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 其他
  • cnnvd_id: 未提取 -> CNNVD-202601-2979
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2026-01-20 03:10:38
data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • data_sources: ['cve'] -> ['cve', 'nvd']